• Title/Summary/Keyword: 개인화 정보 서비스

Search Result 1,148, Processing Time 0.028 seconds

Using Web as CAI in the Classroom of Information Age (정보화시대를 대비한 CAI로서의 Web 활용)

  • Lee, Kwang-Hi
    • Journal of The Korean Association of Information Education
    • /
    • v.1 no.1
    • /
    • pp.38-48
    • /
    • 1997
  • This study is an attempt to present a usage of the Web as CAI in the classroom and to give a direction to the future education in the face of information age. Characteristcs of information society, current curriculum, educational and teacher education are first analyzed in this article. The features of internet and 'Web are then summarized to present benefits of usage in the classroom as a CAI tool. The literature shows several characteristics of information society as follows : a technological computer, a provision and sharing of information, multi functional society, a participative democracy', an autonomy, a time value..A problem solving and 4 Cs(e.g., cooperation, copying, communication, creativity) are newly needed in this learning environment. The Internet is a large collection of networks that are tied together so that users can share their vast resources, a wealth of information, and give a key to a successful, efficient. individual study over a time and space. The 'Web increases an academic achievement, a creativity, a problem solving, a cognitive thinking, and a learner's motivation through an easy access to : documents available on the Internet, files containing programs, pictures, movies, and sounds from an FTP site, Usenet newsgroups, WAIS seraches, computers accessible through telnet, hypertext document, Java applets and other multimedia browser enhancements, and much more, In the Web browser will be our primary tool in searching for information on the Internet in this information age.

  • PDF

Automatic Change Detection Based on Areal Feature Matching in Different Network Data-sets (이종의 도로망 데이터 셋에서 면 객체 매칭 기반 변화탐지)

  • Kim, Jiyoung;Huh, Yong;Yu, Kiyun;Kim, Jung Ok
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.31 no.6_1
    • /
    • pp.483-491
    • /
    • 2013
  • By a development of car navigation systems and mobile or positioning technology, it increases interest in location based services, especially pedestrian navigation systems. Updating of digital maps is important because digital maps are mass data and required to short updating cycle. In this paper, we proposed change detection for different network data-sets based on areal feature matching. Prior to change detection, we defined type of updating between different network data-sets. Next, we transformed road lines into areal features(block) that are surrounded by them and calculated a shape similarity between blocks in different data-sets. Blocks that a shape similarity is more than 0.6 are selected candidate block pairs. Secondly, we detected changed-block pairs by bipartite graph clustering or properties of a concave polygon according to types of updating, and calculated Fr$\acute{e}$chet distance between segments within the block or forming it. At this time, road segments of KAIS map that Fr$\acute{e}$chet distance is more than 50 are extracted as updating road features. As a result of accuracy evaluation, a value of detection rate appears high at 0.965. We could thus identify that a proposed method is able to apply to change detection between different network data-sets.

A Study on Marketing Strategy of MIM Emoticon Using Customized Bundling (맞춤 번들링을 활용한 MIM 이모티콘 마케팅 전략에 관한 연구)

  • Heo, Su-Chang;Jeon, Gyeahyung;Heo, Jae-Kang
    • Management & Information Systems Review
    • /
    • v.38 no.4
    • /
    • pp.1-24
    • /
    • 2019
  • This study confirms the responses of consumers when the composition of emoticon bundles can be selected by individuals in MIM service. This aims to verify that customized bundling is a valid marketing strategy in the MIM emoticon market. Currently, the emoticon bundling used in Korean MIM services is in the form of pure bundling. As a result, Consumers must purchase an entire bundle even though he/she doesn't need to use all the emoticons contained in it. Some researches(e.g. Hitt & Chen, 2005; Wu & Anandalingam, 2002) show that when consumers value only part of the products or services included in pure bundling, customized bundling is much more profitable. In their works, customized bundling is appropriate when marginal costs are near zero. Information goods, such as emoticons, meet the condition. On the other hand, customized bundling increase the choosable options, so it can pose a problem of complexity (Blecker et al., 2004). And consumers may experience information overload(Huffman & Kahn, 1998). Thus, judgement on the necessity to introduce customized bundling needs to be made through empirical analyses in the light of characteristics of the product and the reaction of consumers. Results show that when customized bundling was introduced, consumers' purchase intention and willingness to pay significantly increased. Purchase intention for customized bundles has increased by 0.44 based on the five point Likert scale than the purchase intention for existing pure bundles. The increase in purchase intention for customized bundles was statistically independent of the existing purchasing experience. In addition, the willingness to pay was increased by about 2.8% compared to the price of the existing emoticon bundles in the whole group. The group with experience in purchasing pure bundles were willing to pay 5.9% more than pure bundles. The other group without experience in purchasing pure bundles were willing to buy if they were about 5% cheaper than the existing price. Overall, introducing customized bundling into emoticon bundles can lead to positive consumers responses and be a viable marketing strategy.

A study on Establishment and Management of the CCTV in Operating Room (수술실 CCTV 설치 및 운영에 대한 고찰)

  • Kim, Minji
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.1
    • /
    • pp.109-132
    • /
    • 2019
  • Recently, medical accidents related to surgical procedures have increased. In addition, the media reported that some of these accidents were involved in health crimes. Patient-advocate groups have called for mandatory establishment and management of CCTV in operating rooms. There is a lot of discussion among the interested parties, so it is necessary to review the relevant laws and regulations. The purpose of this study is to identify the characteristics of CCTV in operating rooms and to review legislations related to establishment and management of the CCTV in operating rooms. Medical institutions use CCTV for management of facilities and patient safety and install it in operating rooms optionally. The Constitution guarantees the privacy and the privacy of correspondence of every citizen, but it can be limited by the law for public welfare. Currently, however, there is no existing law about establishment and management of the CCTV in operating rooms and it can be defect of legal system. Under the current legislations, it is likely that the Self-determination can be violated due to the characteristic of healthcare provider when CCTV is mandatorily installed in operating room. In addition, the regulations on access and leakage of confidential information known by operator are insufficient. So that, the safety of the visual data might be threatened. Furthermore, unless the period and the place of storage of the visual data are clearly defined, it is highly unlikely to meet the original purpose of patient safety and prevention of medical accidents. This study is meaningful as there is few previous study on this topic although the need for legal review about this is growing and several bills are being proposed. It is expected that the results of this study can be utilized as basic data for enactment or amendment of the laws and regulations about establishment and management of CCTV in operating rooms.

IoT Security Channel Design Using a Chaotic System Synchronized by Key Value (키값 동기된 혼돈계를 이용한 IoT의 보안채널 설계)

  • Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.981-986
    • /
    • 2020
  • The Internet of Things refers to a space-of-things connection network configured to allow things with built-in sensors and communication functions to interact with people and other things, regardless of the restriction of place or time.IoT is a network developed for the purpose of services for human convenience, but the scope of its use is expanding across industries such as power transmission, energy management, and factory automation. However, the communication protocol of IoT, MQTT, is a lightweight message transmission protocol based on the push technology and has a security vulnerability, and this suggests that there are risks such as personal information infringement or industrial information leakage. To solve this problem, we designed a synchronous MQTT security channel that creates a secure channel by using the characteristic that different chaotic dynamical systems are synchronized with arbitrary values in the lightweight message transmission MQTT protocol. The communication channel we designed is a method of transmitting information to the noise channel by using characteristics such as random number similarity of chaotic signals, sensitivity to initial value, and reproducibility of signals. The encryption method synchronized with the proposed key value is a method optimized for the lightweight message transmission protocol, and if applied to the MQTT of IoT, it is believed to be effective in creating a secure channel.

A Study on the Website Evaluation and Improvement of Korean Cyber University Websites (국내 사이버대학교 웹사이트 평가 및 개선방안 연구)

  • Moon, Tae-Eun;Moon, Hyung-Nam
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.2
    • /
    • pp.137-156
    • /
    • 2008
  • The purpose of this study is to implement evaluation on domestic cyber University web site to analyze web usability and web accessibility in order to present how much cyber University provides various personalized services and qualitative contents to users on web site. And also with this result, I hope to contribute in qualitative development of web site and reliability of remote education. For this purpose, I developed checklist suitable to remote University by applying SM-ABCDE assessment method of Moonhyeongnam, the professor in Sookmyung Women's University, and implemented evaluation on web sites of 17 cyber University over the five aspects of attraction, business, contents, design, and engineering. As the result of this study, it was found that Busan Digital University was best in the respect of attraction, both Kyunghee Cyber University and Cyber University of foreign studies were best in the respect of business, Kyunghee University was best in the respect of contents, and Hanyang Cyber University was best in the respect of design. It was also evaluated in the comprehensive view and the order was found that Kyunghee Cyber University, Busan Cyber University, and Hanyang Cyber University. However in the respect of engineering, it came out that all the sites did not observe the regulation on web accessibility. If domestic Cyber Universities are to observe the regulation on web accessibility with the long term view, on the base of this study, web usability would be increasing. Then they can secure various classes of customers as well as ordinary people so that they will be able to take the real place of educational institution orienting the most advanced educational method in the society of knowledge and information in addition to advance in themselves.

  • PDF

Research on Case Analysis of Library E-learning Platforms: Focusing on Learning Contents and Functions (도서관 이러닝 플랫폼 사례분석 연구 - 학습 내용 및 기능을 중심으로 -)

  • SangEun, Cho;KyungMook, Oh
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.34 no.1
    • /
    • pp.209-238
    • /
    • 2023
  • This study aims to propose the main learning contents, functions and activation plans for building an e-learning platform for libraries through a literature review, case analysis and expert survey. Through the literature review, it was found that libraries must play a role in providing high-quality online education for users in the e-learning ecosystem. Based on the previous studies, a learning function analysis tool was developed for the analysis of the library's e-learning platform. Based on this, the learning contents, learning functions and characteristics of library e-learning platforms were analyzed, and expert surveys and interviews were conducted. As a results, the construction of a platform for effectively applying learning processes and technology is essential for the library's sustainable e-learning services. The contents that should be provided for characteristics of library education, reading guidance, information literacy instruction, library usage instruction, and the latest IT technologies. And The main learning functions include the ability to conduct video lectures and real-time classes among learning types, and learning activity support functions, a cloud platform support function and a personalized environment support function. Additionally, suggested re-education for library staff to improve their technical skills and the formation of an e-learning team.

Attention to the Internet: The Impact of Active Information Search on Investment Decisions (인터넷 주의효과: 능동적 정보 검색이 투자 결정에 미치는 영향에 관한 연구)

  • Chang, Young Bong;Kwon, YoungOk;Cho, Wooje
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.3
    • /
    • pp.117-129
    • /
    • 2015
  • As the Internet becomes ubiquitous, a large volume of information is posted on the Internet with exponential growth every day. Accordingly, it is not unusual that investors in stock markets gather and compile firm-specific or market-wide information through online searches. Importantly, it becomes easier for investors to acquire value-relevant information for their investment decision with the help of powerful search tools on the Internet. Our study examines whether or not the Internet helps investors assess a firm's value better by using firm-level data over long periods spanning from January 2004 to December 2013. To this end, we construct weekly-based search volume for information technology (IT) services firms on the Internet. We limit our focus to IT firms since they are often equipped with intangible assets and relatively less recognized to the public which makes them hard-to measure. To obtain the information on those firms, investors are more likely to consult the Internet and use the information to appreciate the firms more accurately and eventually improve their investment decisions. Prior studies have shown that changes in search volumes can reflect the various aspects of the complex human behaviors and forecast near-term values of economic indicators, including automobile sales, unemployment claims, and etc. Moreover, search volume of firm names or stock ticker symbols has been used as a direct proxy of individual investors' attention in financial markets since, different from indirect measures such as turnover and extreme returns, they can reveal and quantify the interest of investors in an objective way. Following this line of research, this study aims to gauge whether the information retrieved from the Internet is value relevant in assessing a firm. We also use search volume for analysis but, distinguished from prior studies, explore its impact on return comovements with market returns. Given that a firm's returns tend to comove with market returns excessively when investors are less informed about the firm, we empirically test the value of information by examining the association between Internet searches and the extent to which a firm's returns comove. Our results show that Internet searches are negatively associated with return comovements as expected. When sample is split by the size of firms, the impact of Internet searches on return comovements is shown to be greater for large firms than small ones. Interestingly, we find a greater impact of Internet searches on return comovements for years from 2009 to 2013 than earlier years possibly due to more aggressive and informative exploit of Internet searches in obtaining financial information. We also complement our analyses by examining the association between return volatility and Internet search volumes. If Internet searches capture investors' attention associated with a change in firm-specific fundamentals such as new product releases, stock splits and so on, a firm's return volatility is likely to increase while search results can provide value-relevant information to investors. Our results suggest that in general, an increase in the volume of Internet searches is not positively associated with return volatility. However, we find a positive association between Internet searches and return volatility when the sample is limited to larger firms. A stronger result from larger firms implies that investors still pay less attention to the information obtained from Internet searches for small firms while the information is value relevant in assessing stock values. However, we do find any systematic differences in the magnitude of Internet searches impact on return volatility by time periods. Taken together, our results shed new light on the value of information searched from the Internet in assessing stock values. Given the informational role of the Internet in stock markets, we believe the results would guide investors to exploit Internet search tools to be better informed, as a result improving their investment decisions.

Analyzing the Positive and the Negative SNS Behaviors of the Elementary and Middle School Students (초.중학생의 SNS에서의 긍정적.부정적 행동 분석)

  • Lee, Soojung;Yeon, Jeong-Hwa
    • Journal of The Korean Association of Information Education
    • /
    • v.17 no.1
    • /
    • pp.1-8
    • /
    • 2013
  • SNS is a social networking service that removes the barrier between cyber spaces and the real world and helps people who have common interests to have a two-way communication, manage their interpersonal relationships and share information. The domestic and international SNS markets have attained a steady growth, and their growth is being more accelerated in recent days. However, studies on SNS have just examined adults, and it's required to research the use of SNS and cyber behaviors via SNS among elementary and middle school students. This study attempted to analyze the relationship of the use of SNS, motivation of using SNS, the use of active SNS functions, SNS-dependent tendency and SNS awareness to cyber behaviors via SNS among elementary and middle school students. As a result, regardless of gender and grade, stealing private information was the most frequent activity and the frequency of 'contacting strangers' activity increased most rapidly with the usage time and grade. SNS dependency turned out to be the most highly correlated with the negative cyber behavior. Moreover, the difference of gender was not significant to the overall negative cyber behavior, whereas that of grade was.

  • PDF

A Study on Mobile Personalized Healthcare Management System (모바일 개인건강관리시스템에 관한 연구)

  • Lee, Nan Kyung;Lee, Jong Ok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.6
    • /
    • pp.197-204
    • /
    • 2015
  • Recent changes in health care environment including aging population and prevalence of chronic disease encourage the adoption of new innovative technological solutions including wearable vital sensors, wireless networks, and smart phone. In this paper, we present an effective at-home lifestyle monitoring system that can be used for self-management and health intervention of patient himself in the Management-by-Exception perspectives. We implemented the filtering and queuing algorithms as a preprocessor of monitoring system to enhance efficiency of proposed system, and the effective UX design for self-management of patients themselves. The 94,467 actual clinic data was used to test the efficiency of the proposed system. As as a result, 64.8% of the incoming vital data was identified to be filtered out.