• Title/Summary/Keyword: technology adoption

Search Result 1,359, Processing Time 0.027 seconds

A Study on the Success Factors and Development Directions of Co-regulation in the Personal Information Protection Area (개인정보 보호 분야 공동규제의 성공요인과 발전방향에 관한 연구)

  • Young Jin Choi
    • Journal of Information Technology Services
    • /
    • v.22 no.5
    • /
    • pp.51-70
    • /
    • 2023
  • The Personal Information Protection Commission has been promoting the adoption of co-regulation to replace/improve the existing self-regulation programs since 2022. While the Commission's co-regulation framework has received positive feedback for its contribution to address the regulatory issues, it has also faced criticism for being seen as "co-regulation in appearance only without any real differentiation from existing self-regulation." This study aims to examine the case of industry-specific co-regulation proposed by the Personal Information Protection Commission, with the objectives of 1) determining whether their approach can be categorized as a type of co-regulation with differentiation from the existing self-regulation programs, and 2) proposing improvements for successful regulation. The 'co-regulation' of the Commission can be classified as a form of co-regulation that differs with traditional self-regulation, as it involves government and private organizations collaborating to establish self regulatory codes reflecting industry-specific characteristics as well as provides interest groups with incentives to comply with the codes. The co-regulation framework is evaluated to some extent as successful, but there is still room for improvement in three major aspects. (1) When selecting the areas for co-regulation, a focus should be placed on areas where technological changes are rapid, and government regulations should be applied in areas where they are not. (2) It is necessary to enhance the expertise of regulatory agencies, and (3) ensuring the democratic nature of regulation, such as encouraging the participation of civil organizations, is necessary.

Scholarly Assessment of Aruco Marker-Driven Worker Localization Techniques within Construction Environments (Aruco marker 기반 건설 현장 작업자 위치 파악 적용성 분석)

  • Choi, Tae-Hun;Kim, Do-Kuen;Jang, Se-Jun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.23 no.5
    • /
    • pp.629-638
    • /
    • 2023
  • This study introduces an innovative approach to monitor the whereabouts of workers within indoor construction settings. While traditional modalities such as GPS and NTRIP have demonstrated efficacy for outdoor localizations, their precision dwindles in indoor environments. In response, this research advocates for the adoption of Aruco markers. Leveraging computer vision technology, these markers facilitate the quantification of the distance between a worker and the marker, subsequently pinpointing the worker's instantaneous location with heightened accuracy. The methodology's efficacy was rigorously evaluated in a real-world construction scenario. Parameters including system stability, the influence of lighting conditions, the extremity of measurable distances, and the breadth of recognition angles were methodically appraised. System stability was ascertained by maneuvering the camera at a uniform velocity, gauging its marker recognition prowess. The impact of varying luminosity on marker discernibility was scrutinized by modulating the ambient lighting. Furthermore, the camera's spatial movement ascertained both the upper threshold of distance until marker recognition waned and the maximal angle at which markers remained discernible.

Analysis of the Effect of Farmers' Use of Information Devices on the Sales of Agricultural Products (농가의 정보화 기기 활용이 농산물 판매에 미치는 효과 분석)

  • Seong-Hyuk Hwang;Jongin Kim
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.133-142
    • /
    • 2023
  • The use of digital information technology has become important in order to effectively respond to changes in production conditions in Korean agriculture, which are continuously worsening due to a decrease in the rural population, deepening aging, and climate change. Accordingly, this study analyzed the factors affecting farmers' adoption of information devices use and the effect of information devices use on agricultural product sales using the propensity score matching method. As a result of the analysis, it was found that low-age farmers, high-education farmers, and leading farmers are highly likely to adopt use of information devices. For farms with similar characteristics such as age, management size, and farming type, it has been confirmed that farms that have adopted information devices use in agricultural management have higher sales of agricultural products. Therefore, increasing farmers' access to information and the ability to use information devices provides implications that farm income can be improved. The government's informatization support project in the agricultural and rural sectors is important so that farmers can have the ability to distribute informatization devices and utilize agricultural information, and active investment should also be made in information infrastructure.

A Study on Intention to Use Personal Cloud Services: Focusing on Value Comparison (개인용 클라우드 서비스 사용 의도 연구: 가치 비교를 중심으로)

  • Kyunghoi Min;Chanhee Kwak;HanByeol Stella Choi;Heeseok Lee
    • Information Systems Review
    • /
    • v.22 no.2
    • /
    • pp.1-24
    • /
    • 2020
  • Cloud computing technology is expanding its services to individual consumers through storage and applications. This study aims to compare the predisposing factors that affect the perceived value and the intention to use between users who have used or experienced services and those who have never experienced services from the perspective of benefit and sacrifice based on the value-based acceptance model. The results showed that the sacrifice factor (perceived cost) had a significant effect on perceived value and perceived value had a significant effect on intention to use, but showed a difference in perceived benefit. Perceived usefulness, ubiquity, and network effects had significant impact for experienced users' perceived value, but for inexperienced users, ubiquity did not have significant impact. In addition, usefulness was the most significant factor for experienced users while network effect was the same for inexperienced users. The results of this study suggest that consumers' intention to use personal cloud service is evaluated as a benefit and sacrifice point and a new attempt to re-examine the role of previous experience.

Montgomery Multiplier with Very Regular Behavior

  • Yoo-Jin Baek
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.17-28
    • /
    • 2024
  • As listed as one of the most important requirements for Post-Quantum Cryptography standardization process by National Institute of Standards and Technology, the resistance to various side-channel attacks is considered very critical in deploying cryptosystems in practice. In fact, cryptosystems can easily be broken by side-channel attacks, even though they are considered to be secure in the mathematical point of view. The timing attack(TA) and the simple power analysis attack(SPA) are such side-channel attack methods which can reveal sensitive information by analyzing the timing behavior or the power consumption pattern of cryptographic operations. Thus, appropriate measures against such attacks must carefully be considered in the early stage of cryptosystem's implementation process. The Montgomery multiplier is a commonly used and classical gadget in implementing big-number-based cryptosystems including RSA and ECC. And, as recently proposed as an alternative of building blocks for implementing post quantum cryptography such as lattice-based cryptography, the big-number multiplier including the Montgomery multiplier still plays a role in modern cryptography. However, in spite of its effectiveness and wide-adoption, the multiplier is known to be vulnerable to TA and SPA. And this paper proposes a new countermeasure for the Montgomery multiplier against TA and SPA. Briefly speaking, the new measure first represents a multiplication operand without 0 digits, so the resulting multiplication operation behaves in a very regular manner. Also, the new algorithm removes the extra final reduction (which is intrinsic to the modular multiplication) to make the resulting multiplier more timing-independent. Consequently, the resulting multiplier operates in constant time so that it totally removes any TA and SPA vulnerabilities. Since the proposed method can process multi bits at a time, implementers can also trade-off the performance with the resource usage to get desirable implementation characteristics.

Overcoming the Challenges in the Development and Implementation of Artificial Intelligence in Radiology: A Comprehensive Review of Solutions Beyond Supervised Learning

  • Gil-Sun Hong;Miso Jang;Sunggu Kyung;Kyungjin Cho;Jiheon Jeong;Grace Yoojin Lee;Keewon Shin;Ki Duk Kim;Seung Min Ryu;Joon Beom Seo;Sang Min Lee;Namkug Kim
    • Korean Journal of Radiology
    • /
    • v.24 no.11
    • /
    • pp.1061-1080
    • /
    • 2023
  • Artificial intelligence (AI) in radiology is a rapidly developing field with several prospective clinical studies demonstrating its benefits in clinical practice. In 2022, the Korean Society of Radiology held a forum to discuss the challenges and drawbacks in AI development and implementation. Various barriers hinder the successful application and widespread adoption of AI in radiology, such as limited annotated data, data privacy and security, data heterogeneity, imbalanced data, model interpretability, overfitting, and integration with clinical workflows. In this review, some of the various possible solutions to these challenges are presented and discussed; these include training with longitudinal and multimodal datasets, dense training with multitask learning and multimodal learning, self-supervised contrastive learning, various image modifications and syntheses using generative models, explainable AI, causal learning, federated learning with large data models, and digital twins.

A Case Study in Applying Hyperautomation Platform for E2E Business Process Automation (E2E 비즈니스 프로세스 자동화를 위한 하이퍼오토메이션 플랫폼 적용방안 및 사례연구)

  • Cheonsu Jeong
    • Information Systems Review
    • /
    • v.25 no.2
    • /
    • pp.31-56
    • /
    • 2023
  • As the COVID-19 pandemic is prolonged, non-contact work has increased, as well as the demand for automation of simple and repetitive questions and tasks with success of using them. Therefore, companies are attempting to expand the area of automated business and apply various technologies such as AI to complex and various business processes of E2E to provide automation of all business. However, the extension to Intelligent Process Automation (IPA) is still in its beginning stage so that it is difficult to find practical use cases and related solutions. In this aspect, it is safe to say that there is insufficient evidence for companies which have various and complex enterprise processes to make a decision about the adoption. In this study, to solve this problem, a Hyper Automation Platform (HAP) that consists of RPA, Chatbot, and AI technology was proposed. Moreover, an implementation method that can bring intelligent process automation using HAP, and practical use-cases were provided so that it makes it possible to review the implementation of the HAP objectively and comprehensively. This study is meaningful and valuable to check the feasibility of the Hyper Automation concept and to actively utilize HAP.

A Study on the Improvement of the Existing Technology Valuation Solutions;focused on high technology based start-up company (현행 기술가치 평가모형의 개선 방안에 관한 연구;신기술 창업기업의 경우를 중심으로)

  • Yang, Tai-Shik;Min, Kyung-Se
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.2 no.2
    • /
    • pp.93-120
    • /
    • 2007
  • To promote the commercialization of high technology based start-up company, it is essential to activate technology trading for the Innovative Small & Medium companies which eager to acquire technology competitiveness through technology trading and facilitate financial system which provide Small & Medium companies with technology commercialization money. This study focus on enhancing credibility of technology valuation solutions through the improvement of the existing technology valuation solutions. The existing technology valuation solutions in practice have deficiency in reasonable valuation because of subjective technology factor's calculation. And the commercialization risk of high technology based start-up companies cannot be fully reflected in the existing valuation solutions. The high risk of technology commercialization acts as a hurdle in the facilitation of providing money for the start-up companies. The improved new model will have more acceptable objectivity and reasonably reflect the commercialization risk of start-up companies. The new model has two distinctive features compared to existing solutions. The new model newly adopts commercialization success factor which reflects the risk of high technology based start-up company. And the new model excludes technology factor which is controversial among interested parties. The exclusion of technology factor will improve the objectivity of technology valuation and the adoption of commercialization success factor will solicit investor and capitalist who concern the high risk of technology based start-up companies. In conclusion, the improved new model is expected to activate technology trading and facilitate the money market through which high technology based start-up companies raise commercialization money.

  • PDF

A Comparative Case Study on the Adaptation Process of Advanced Information Technology: A Grounded Theory Approach for the Appropriation Process (신기술 사용 과정에 관한 비교 사례 연구: 기술 전유 과정의 근거이론적 접근)

  • Choi, Hee-Jae;Lee, Zoon-Ky
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.99-124
    • /
    • 2009
  • Many firms in Korea have adopted and used advanced information technology in an effort to boost efficiency. The process of adapting to the new technology, at the same time, can vary from one firm to another. As such, this research focuses on several relevant factors, especially the roles of social interaction as a key variable that influences the technology adaptation process and the outcomes. Thus far, how a firm goes through the adaptation process to the new technology has not been yet fully explored. Previous studies on changes undergone by a firm or an organization due to information technology have been pursued from various theoretical points of views, evolved from technological and institutional views to an integrated social technology views. The technology adaptation process has been understood to be something that evolves over time and has been regarded as cycles between misalignments and alignments, gradually approaching the stable aligned state. The adaptation process of the new technology was defined as "appropriation" process according to Poole and DeSanctis (1994). They suggested that this process is not automatically determined by the technology design itself. Rather, people actively select how technology structures should be used; accordingly, adoption practices vary. But concepts of the appropriation process in these studies are not accurate while suggested propositions are not clear enough to apply in practice. Furthermore, these studies do not substantially suggest which factors are changed during the appropriation process and what should be done to bring about effective outcomes. Therefore, research objectives of this study lie in finding causes for the difference in ways in which advanced information technology has been used and adopted among organizations. The study also aims to explore how a firm's interaction with social as well as technological factors affects differently in resulting organizational changes. Detail objectives of this study are as follows. First, this paper primarily focuses on the appropriation process of advanced information technology in the long run, and we look into reasons for the diverse types of the usage. Second, this study is to categorize each phases in the appropriation process and make clear what changes occur and how they are evolved during each phase. Third, this study is to suggest the guidelines to determine which strategies are needed in an individual, group and organizational level. For this, a substantially grounded theory that can be applied to organizational practice has been developed from a longitudinal comparative case study. For these objectives, the technology appropriation process was explored based on Structuration Theory by Giddens (1984), Orlikoski and Robey (1991) and Adaptive Structuration Theory by Poole and DeSanctis (1994), which are examples of social technology views on organizational change by technology. Data have been obtained from interviews, observations of medical treatment task, and questionnaires administered to group members who use the technology. Data coding was executed in three steps following the grounded theory approach. First of all, concepts and categories were developed from interviews and observation data in open coding. Next, in axial coding, we related categories to subcategorize along the lines of their properties and dimensions through the paradigm model. Finally, the grounded theory about the appropriation process was developed through the conditional/consequential matrix in selective coding. In this study eight hypotheses about the adaptation process have been clearly articulated. Also, we found that the appropriation process involves through three phases, namely, "direct appropriation," "cooperate with related structures," and "interpret and make judgments." The higher phases of appropriation move, the more users represent various types of instrumental use and attitude. Moreover, the previous structures like "knowledge and experience," "belief that other members know and accept the use of technology," "horizontal communication," and "embodiment of opinion collection process" are evolved to higher degrees in their dimensions of property. Furthermore, users continuously create new spirits and structures, while removing some of the previous ones at the same time. Thus, from longitudinal view, faithful and unfaithful appropriation methods appear recursively, but gradually faithful appropriation takes over the other. In other words, the concept of spirits and structures has been changed in the adaptation process over time for the purpose of alignment between the task and other structures. These findings call for a revised or extended model of structural adaptation in IS (Information Systems) literature now that the vague adaptation process in previous studies has been clarified through the in-depth qualitative study, identifying each phrase with accuracy. In addition, based on these results some guidelines can be set up to help determine which strategies are needed in an individual, group, and organizational level for the purpose of effective technology appropriation. In practice, managers can focus on the changes of spirits and elevation of the structural dimension to achieve effective technology use.

An Exploratory Study of Purchasing Decision Making and Adoption on the RFID Purchasing Customer (RFID 구매고객의 구매 의사결정과 수용에 대한 탐색적 연구)

  • Seo, Pil-Su;Jang, Jang-Yi;Shim, Kyeng-Su
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.3 no.4
    • /
    • pp.89-116
    • /
    • 2008
  • RFID (Radio Frequency Identification) is regarded as a core technology of ubiquitous computing. Although it has some technical limitations such as technological standardization of RFID tags as well as economical limitations, many companies around the world have already accepted RFID to improve their management efficiency. In this regard, this study is to meet with results that the adoption of RFID technology willbring opportunities that companies' operational process are improved and customer satisfaction is highly strengthened. This research focuses on providing more understanding for building RFID marketing strategy to suppliers who want to sell their RFID products to customers through analyzing purchasing process. The findings are as follows; First, the study shows that buying center members usually take product reliability and precision of technical specification in the case of new-task buying situation while they put their first purchasing priority on prices in the straight rebuy. Second, the finding presents that in new-task buying situation and the straight rebuy purchasing personnel get information about new products through product performance test, organizational engineers, opinions from other companies' purchasing personnel, and checking out samples. Third, this research demonstrates when it comes to purchasing risk in their first purchasing, the persons who are in charge of material purchasing are inclined to be aware of the risk most in technical problems, followed by financial problems and time delay problems in order. And in addition to those risks are mentioned above, once-again-purchasers take the risk like an opportunity loss for better products into consideration. Fourth, the study shows that the role of concerning departments makes no difference in each purchasing stage. Accordingly marketers need to beef up the differentiated strategy to persuade their customers Fifth, the findings of this study demonstrate that purchasing decision making is much influenced by the final users. So suppliers are supposed to perform the most active marketing strategy at the first stage of purchasing through various resources. Finally, the study presents that the suppliers who will have had close relationships with their customers need to give consistent information to them so that their customers can have lower motive in purchasing products from competitors.

  • PDF