• Title/Summary/Keyword: security factors

Search Result 1,957, Processing Time 0.342 seconds

A Study on Knowledge Management Vision and Implications of Ministry of Culture, Sports and Tourism (문화체육관광부의 지식관리 비전과 시사점에 대한 연구)

  • Lee, Hyangsoo;Lee, Seong-Hoon
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.29-36
    • /
    • 2019
  • In this study, we analyzed knowledge management cases of the Ministry of Culture, Sports and Tourism and examined knowledge management vision, promotion organization and knowledge management activity system. This study aims to clarify implications for successful knowledge management in government sector. In the case of the Ministry of Culture, Sports and Tourism, which was the subject of the study, it was evaluated as having performed well in the management activities of the government department in the evaluation of "Knowledge Target for 2018" jointly hosted by Maeil Economic Daily and the Ministry of Public Administration and Security. In this study, we conducted an in - depth interview with the knowledge management staff of the Ministry of Culture and Tourism and analyzed the success factors of knowledge management in the government sector. First, the vision of knowledge management and the role of dedicated organization were very important. In addition, knowledge management system was used to effectively acquire, share, and accumulate knowledge and utilize it. In addition, appropriate compensation systems for knowledge management activities are also important success factors. Therefore, in order to encourage knowledge management activities, it is necessary for public institutions to establish an incentive system such as an economic compensation system for personnel sharing activities and HR personnel.

Does Artificial Intelligence Algorithm Discriminate Certain Groups of Humans? (인공지능 알고리즘은 사람을 차별하는가?)

  • Oh, Yoehan;Hong, Sungook
    • Journal of Science and Technology Studies
    • /
    • v.18 no.3
    • /
    • pp.153-216
    • /
    • 2018
  • The contemporary practices of Big-Data based automated decision making algorithms are widely deployed not just because we expect algorithmic decision making might distribute social resources in a more efficient way but also because we hope algorithms might make fairer decisions than the ones humans make with their prejudice, bias, and arbitrary judgment. However, there are increasingly more claims that algorithmic decision making does not do justice to those who are affected by the outcome. These unfair examples bring about new important questions such as how decision making was translated into processes and which factors should be considered to constitute to fair decision making. This paper attempts to delve into a bunch of research which addressed three areas of algorithmic application: criminal justice, law enforcement, and national security. By doing so, it will address some questions about whether artificial intelligence algorithm discriminates certain groups of humans and what are the criteria of a fair decision making process. Prior to the review, factors in each stage of data mining that could, either deliberately or unintentionally, lead to discriminatory results will be discussed. This paper will conclude with implications of this theoretical and practical analysis for the contemporary Korean society.

Analysis of relative importance priority based on blockchain technology characteristics using AHP technique (AHP 기법을 이용한 블록체인 기술 특성 기반 상대적 중요도 우선순위 분석)

  • Oh, Kyoung-Sang;Lee, Dong-Myung
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.239-250
    • /
    • 2021
  • When considering the introduction of a new technology, it is important to accurately grasp and selectively apply the technical characteristics related to the technology in order to fully utilize the advantages of the technology. In this study, the technical characteristics of high relative importance were analyzed in order to increase the efficiency of new application of blockchain technology by companies. The technical characteristics of the blockchain identified through previous research were reclassified from the perspective of the system hierarchy, and sub-factors of the technical characteristics were derived. In addition, a questionnaire survey on the relative importance of technical characteristics was conducted for internal experts and SI experts using the Analytical Hierarchy Process (AHP) technique. As a result of the analysis, respondents evaluated data protection as the most important factor in the threat of hacking related to security. In addition, it was different that the comparison results of the importance of the technical characteristics between the experts in the company and the SI experts and the priority of the technical characteristics between the expert groups by industry. It is expected that the results of this study will be usefully utilized when using blockchain technology in enterprises in line with the upcoming changes of the 4th industrial revolution. An empirical analysis of the internal and external factors required for adoption of blockchain technology by industry and the effect of technology introduction will be a meaningful study.

A Study on the Factors Affecting User Behavior of Internet Medical Apps (인터넷 의료 애플리케이션 사용 행위에 영향을 미치는 요소에 관한 연구)

  • Han, Xiao;Lee, Hong;Kim, Hyeong-woo
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.81-90
    • /
    • 2020
  • Due to the recent economic development and the improvement of income level in China, the desire for quality medical services is increasing compared to the past. As an alternative to satisfy these needs, various applications using smart phones and the like are being developed. The new corona that occurred in December 2019 began to show great interest in non-face-to-face telemedicine services using smart phones due to the worldwide spread of the coronavirus. Therefore, in this study, a total of 200 people were surveyed on the top three mobile medical applications in China, and the data of 120 people who actually used medical applications were analyzed based on Venkatesh's UTAUT2 theory. A study was conducted on the intent to use and the factors affecting the in-law behavior. First, it has become clear that the interactive characteristics, expectations for effort, price value, interest in privacy, habits, and promotional conditions have a positive impact on the user's use. Second, it was investigated that the user's intention to use influences the behavior of use, and among the intentions of use, it was found that the mobilization characteristic expectation, hedonistic motivation, price value, habits, and promotion conditions affect the use behavior. Third, a study result was derived that the controlling variables such as gender, age, school age, and annual income do not affect the user's intention to use mobile medical applications as a controlling variable. Finally, due to the nature of mobile devices that use the Internet, various security vulnerabilities exist, and this can cause great damage or personal and social impact. Therefore, for the development of mobile medical services in China, it is necessary to re-establish a research model through comprehensive and in-depth considerations to supplement these problems in the future.

Analysis of influential factors of cyanobacteria in the mainstream of Nakdong river using random forest (랜덤포레스트를 이용한 낙동강 본류의 남조류 발생 영향인자 분석)

  • Jung, Woo Suk;Kim, Sung Eun;Kim, Young Do
    • Journal of Wetlands Research
    • /
    • v.23 no.1
    • /
    • pp.27-34
    • /
    • 2021
  • In this study, the main influencing factors of the occurrence of cyanobacteria at each of the eight Multifunctional weirs were derived using a random forest, and a categorical prediction model based on a Algal bloom warning system was developed. As a result of examining the importance of variables in the random forest, it was found that the upstream points were directly affected by weir operation during the occurrence of cyanobacteria. This means that cyanobacteria can be managed through efficient security management. DO and E.C were indicated as major influencers in midstream. The midstream section is a section where large-scale industrial complexes such as Gumi and Gimcheon are concentrated as well as the emissions of basic environmental facilities have a great influence. During the period of heatwave and drought, E.C increases along with the discharge of environmental facilities discharged from the basin, which promotes the outbreak of cyanobacteria. Those monitoring sites located in the middle and lower streams are areas that are most affected by heat waves and droughts, and therefore require preemptive management in preparation for the outbreak of cyanobacteria caused by drought in summer. Through this study, the characteristics of cyanobacteria at each point were analyzed. It can provide basic data for policy decision-making for customized cyanobacteria management.

A Study on the Improvement of the Intention of Continuous Use of Enterprise Content Management System: Focusing on the Technology Acceptance Model (기업콘텐츠관리시스템의 지속적 이용의도 향상에 대한 연구: 기술수용모델을 중심으로)

  • Hwang, In-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.229-243
    • /
    • 2021
  • As systematic information protection and management is recognized as an organization's core value, organizations are pursuing a shift from an individual-centered information management method to an organization-oriented information management method. The Enterprise content management system(ECMS) is a solution that supports document security and information sharing by insiders and is being introduced by many organizations due to recent technological developments. The purpose of this study is to present a method of improving performance through continuous use of the ECMS from the user's point of view and also suggest a method to improve the intention of continuous use through the expansion of the technology acceptance model. This study surveyed the employees of organizations that adopted the ECMS and verified the research hypothesis derived from previous studies through structural equation modeling. As a result of the analysis, usefulness, and ease of use affected on the intention of continuous use of the ECMS, and the knowledge sharing culture and the ECMS quality factors affected the technology acceptance model factors. The results of this study have academic and practical significance in terms of suggesting a plan to increase the usability of the ECMS from the user's point of view.

Building an IS Environment and Support Structure for Insiders to Comply with IS: A Perspective on Improving the IS Related Justice Climate (내부자의 정보보안 준수를 위한 정보보안 환경 및 지원 체계 구축: 정보보안 공정성 분위기 강화 관점)

  • Hwang, In-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.5
    • /
    • pp.913-926
    • /
    • 2022
  • As information is recognized as a core competency of organizations, organizations are increasingly investing in policies and technologies for information security(IS). Recently, as information exposure accidents by people have occurred continuously, interest in IS behaviors of organization insiders is increasing. This study aims to confirm the effect of the IS environment and support structure established by the organization on the intention of individuals to comply with IS. We conducted a survey of employees in organizations with IS policies and tested the hypothesis using the structural equation of AMOS 22.0 and Process 3.1 using 421 samples. As a result of the analysis, authentic leadership and justice climate, which are factors that build an IS environment, and communication and feedback, which are factors supporting IS compliance, have a positive effect on employees' compliance intention. In addition, authentic leadership, punishment, communication, and feedback were found to reinforce the positive impact of IS justice climate. As the study suggested the overall structural design direction to be pursued to reinforce insider's IS behavior, and the results help to achieve the IS goal.

A Ship-Wake Joint Detection Using Sentinel-2 Imagery

  • Woojin, Jeon;Donghyun, Jin;Noh-hun, Seong;Daeseong, Jung;Suyoung, Sim;Jongho, Woo;Yugyeong, Byeon;Nayeon, Kim;Kyung-Soo, Han
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.1
    • /
    • pp.77-86
    • /
    • 2023
  • Ship detection is widely used in areas such as maritime security, maritime traffic, fisheries management, illegal fishing, and border control, and ship detection is important for rapid response and damage minimization as ship accident rates increase due to recent increases in international maritime traffic. Currently, according to a number of global and national regulations, ships must be equipped with automatic identification system (AIS), which provide information such as the location and speed of the ship periodically at regular intervals. However, most small vessels (less than 300 tons) are not obligated to install the transponder and may not be transmitted intentionally or accidentally. There is even a case of misuse of the ship'slocation information. Therefore, in this study, ship detection was performed using high-resolution optical satellite images that can periodically remotely detect a wide range and detectsmallships. However, optical images can cause false-alarm due to noise on the surface of the sea, such as waves, or factors indicating ship-like brightness, such as clouds and wakes. So, it is important to remove these factors to improve the accuracy of ship detection. In this study, false alarm wasreduced, and the accuracy ofship detection wasimproved by removing wake.As a ship detection method, ship detection was performed using machine learning-based random forest (RF), and convolutional neural network (CNN) techniquesthat have been widely used in object detection fieldsrecently, and ship detection results by the model were compared and analyzed. In addition, in this study, the results of RF and CNN were combined to improve the phenomenon of ship disconnection and the phenomenon of small detection. The ship detection results of thisstudy are significant in that they improved the limitations of each model while maintaining accuracy. In addition, if satellite images with improved spatial resolution are utilized in the future, it is expected that ship and wake simultaneous detection with higher accuracy will be performed.

The Determinants of Ginseng Products Purchase during the Trip in Korea (인삼 제품 구매 선택과 결정 요인 분석)

  • Ho-Jung Yoon;Hyun Sung Cho;Sung Ah Lim
    • Journal of Ginseng Culture
    • /
    • v.5
    • /
    • pp.97-114
    • /
    • 2023
  • Despite numerous studies, research on ginseng in aspect of an economic and business perspective are insufficient. Recently, research to reveal the economic cause of ginseng products purchase is drawing attention. The purpose of this study is to analyze empirically the factors of ginseng products purchase by international consumers from a microeconomic perspective. Using the survey data, we empirically investigate the determinants of ginseng products purchase by international consumers visiting Korea. We use a multinomial logistic model to find the determinants that influence the purchase of ginseng products. This study finds the followings. First, the economic factor is an important determinant of ginseng products purchase. The average daily expenditure has a greater impact on ginseng products purchase than household income does. Even though the average daily expenditure is high, they tend to buy less ginseng products when they prefer other products. Second, demographically, gender and age are also important determinants of ginseng products purchase. It has been found that elderly male consumers are more likely to buy ginseng products. Third, international consumers for leisure purposes have a higher probability of buying ginseng products than tourism consumers for other purposes do. Finally, destination attributes such as security (safety), ease of use of mobile/Internet, and ease of finding directions are also important factors affecting ginseng products purchase. In addition, it is found that the convenience of using the mobile/Internet, the ease of finding directions, and the convenience of shopping increase the probability of buying ginseng products by international consumers. This study is meaningful in that it explored the determinants of ginseng products purchase by analyzing individual consumers' ginseng products choices.

The Influence of Ethical Leadership and Collaborative Communication on IS Behavior in Organizations: The Role of Trust and Person-Organization Fit (조직 내 정보보안 행동 관련 윤리적 리더십과 협력적 커뮤니케이션의 영향: 신뢰 및 개인-조직 적합성 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.3
    • /
    • pp.465-474
    • /
    • 2023
  • As the effective use and strong protection of an organization's information resources are recognized as a condition for the growth of an organization, they are increasing technological and policy investments in IS(information security). However, information exposure can occur from external invasions such as hacking and incidents related to misuse and abuse by insiders. This study proposes a mechanism that considers the organizational environment and individual characteristics from the viewpoint of promoting employees' IS participation activities. In other words, the study presents the complex effects of organizational environmental factors (ethical leadership, IS collaborative communication) and personal factors (person-organization fit) on organization trust and IS voice behavior. We surveyed office workers who asked for IS-related business activities and tested hypotheses using 422 samples. As a result, ethical leadership influenced organization trust through collaborative communication, and organization trust strengthened IS voice behavior by having an interaction effect with person-organization fit. This study suggests direction for establishing an organizational environment for promoting IS-related activities by office workers, so it provides practical implications for organizations with goals related to internal information exposure control.