• Title/Summary/Keyword: 디지털지적

Search Result 432, Processing Time 0.023 seconds

A Study on the Relation between Record and Information Management and Knowledge Management from the Perspective of Knowledge Management : Focused on the Definition and Management Process (지식경영 관점에서 본 기록관리와 지식경영의 연관 관계 - 지식의 정의와 지식관리 프로세스를 중심으로 -)

  • Roh Jeong-Ran
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.39 no.4
    • /
    • pp.5-24
    • /
    • 2005
  • The various concepts of knowledge such as Knowledge Management(KM). Intellectual assets and digital knowledge asset management are currently important issues among many organizations. To the country like Korea that has professed Itself for a great power of knowledge Information and adopted KM and Record and Information Management (RIM) as the country's main polity, the study on the theoretical basis and best practices of KM and RIM from the perspective of Library & Information science is very urgent. However, many studies on knowledge including KM were mainly done at the business administrative field. and the consolidated study basis on knowledge even in the Library & Information Sciences was quite in deficiency, furthermore any discussion on knowledge, correlation among related systems and the possibilities of cooperation as the development of Information communication has not been done. Therefore, this study is to present the alternative plan of the consolidated management on knowledge through comparative analysis on the definition, main function and trend of KM & RIM. Especially, this study would be the theoretical basis to the public organizations that plan to introduce KM & RIM.

Comparative analysis of group cognizance regarding application of copyright laws in library (도서관 저작권보상에 대한 집단인식 비교연구)

  • Kim, Po-Ok;Lee, Jin-Suk
    • Journal of Information Management
    • /
    • v.35 no.3
    • /
    • pp.29-50
    • /
    • 2004
  • This study, considering the many disputes in today's society centered around copyrights, aimed at analyzing and investigating the scope of application for copyright laws in library, whether where is a reach or not, and also the procedures and cognitive degrees in copying and transmission of copyrights materials. Especially the usage of the digital resources built by major domestic libraries have been looked at, and how they reveal the cognitive degree of copyright laws toward various social stratums have been analyzed. Research subjects in each social stratum were firstly classified, which centered around university library users, authors as well as librarians in each university library public access post, then the difference of understanding toward copyright laws between each of these 3 groups was analyzed, and also at the same time the problems in usage authorization procedures of copyrighted materials in library were analyzed. so that the solutions to such problems can be found.

Design of robust Watermarking Algorithm against the Geometric Transformation for Medical Image Security (의료 영상보안을 위한 기하학적 변형에 견고한 워터마킹 알고리즘 설계)

  • Lee, Yun-Bae;Oh, Guan-Tack
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2586-2594
    • /
    • 2009
  • A digital watermarking technique used as a protection and certifying mechanism of copyrighted creations including music, still images, and videos in terms of finding any loss in data, reproduction and pursuit. This study suggests using a selected geometric invariant point through the whole processing procedure of an image and inserting and extracting based on the invariant point so that it will be robust in a geometric transformation attack. The introduced algorithm here is based on a watershed splitting method in order to make medical images strong against RST(Rotation Scale, Translation) transformation and other processing. It also helps to maintain the watermark in images that are compressed and stored for a period of time. This algorithm also proved that is has robustness against not only JPEG compression attack, but also RST attack and filtering attack.

융합시대의 IT R&D 방향

  • Choe, Mun-Gi
    • Information and Communications Magazine
    • /
    • v.25 no.1
    • /
    • pp.25-31
    • /
    • 2008
  • 사회변혁 과정에서 경쟁우위 확보는 그 시대를 대표하는 기술의 습득과 활용의 정도에 따라 좌우된다. 우리나라의 경우 정보혁명 과정에서 IT기술의 습득과 활용을 위하여 적극적인 노력을 기울인 결과 IT강국이라는 현재의 위치를 확보할 수 있게 되었다. 그러나, 최근들어 IT산업이 국가의 경제발전을 지속적으로 선도하여 나가기 위해서는 IT 산업내의 구조적 취약점을 해결해야 한다는 지적과 함께 참여정부에서 시작된 IT39 중심의 산업정책에 대한 비판도 제기되고 있다. 이에 따라 사회변화의 방향을 가늠해 보고 우리 IT산업이 직면한 문제 분석과 이를 토대로 한 새로운 IT R&D 방향을 모색할 필요가 있다. 미래사회 변화의 큰 특징은 융합으로 대변된다. 정보처리 기술과 통신기술의 융합으로 시작된 이 흐름은 최근 통방융합이라는 차원을 넘어 이종기술간 및 이종산업간 융합이라는 개념으로 확장 진화되고 있다. 또한, 사회변혁의 패러다임도 지식기반사회에서 융합시대로 급격히 전환되고 있다. 융합이라는 패러다임 변혁의 물결에 편승하기 위해서는 IT기술이 융합시대에서 어떠한 역할을 하고, 어떻게 진화해 갈 것인지를 규명하는 작업이 필요하다. IT기술은 그동안의 혁신적 발전을 기반으로 여타 기술 및 산업 발전을 견인하는 원천기술로 작용할 것이 확실시 된다. 따라서, 융합시대에서 IT기술은 기존의 독자적 산업영역에 국한되지 않고 새로운 기술과 산업으로 그 응용범위가 대폭 확장됨으로써 기존에 IT가 지녔던 기술적, 산업적 중요 성과는 비교할 수 없을 정도의 의미를 지니게 될 것이다. 융합시대에 대응하여 IT R&D 방향을 검토하는 전략적 의미도 여기에서 찾을 수 있게 된다. 융합시대에서 IT R&D는 IT가 여타 기술 및 산업발전을 위한 원천기술화를 비롯하여 (1) 유비쿼터스 인프라, (2) 디지털 인텔리전스, (3) 융합부품, (4) 메가 컨버전스 등과 같은 4대 동력에 집중할 필요가 있다. IT의 원천기술화 및 4대 동력에의 집중이야말로 융합시대를 슬기롭게 열어가는 '전략적 창(strategic window)‘이 될 것이다.

A Study on the Evaluation of Service Quality in Special Library of Local Autonomous Entity Research Institution (지방연구원 소속 전문도서관의 서비스 품질 평가에 관한 연구)

  • Lee, Sera;Kim, Ji-Hyun
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.1
    • /
    • pp.73-94
    • /
    • 2019
  • The purpose of this study is to investigate the quality of service that affects satisfaction of special library users and to suggest ways to improve the function and role of special library. The data were collected by survey and interview method conducted with 111 library users in 6 local research institute using modified questionnaires based on LibQUAL+. The results revealed that human quality factor had more influence on library service satisfaction than space and information quality factor. Also, there were statistically significant influence between library service satisfaction and three sub service factors, such as service attitude, space convenience, and information usability. The interviewers indicated problems of special library service in lack of data, inactivation of digital data, space problem, data sharing problem, and lack of experts. Finally this study proposed several suggestions to improve service quality of special library of local autonomous entity research institution.

An Empirical Study on Factors Affecting the University Students' Software Piracy Intention (대학생들의 S/W 불법복제 의도에 영향을 미치는 요인에 관한 연구)

  • Jeon, Jin-Hwan;Kim, Jong-Ki
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.127-140
    • /
    • 2009
  • Recently, software piracy is one of the serious crimes for the digital materials. It makes economically devasting to the software industry and the market. In particular, it is a widespread phenomenon among university students in Korea and negative affects in measuring social and cultural level. Many studies have been focused on the users' intention of the software piracy for making anti-piracy policy. The purpose of this study is to investigate the factors affecting university students' software piracy intention. The survey includes responses from 271 university students in a school of business adminstration. The research model was estimated with multiple regression. The analysis showed results that user's characteristics, subjective norms, and perceived software quality were significantly related to intention of software piracy, but security policy was not. Perceived importance of intellectual property has negative impact on user's software piracy intention. Based on the findings, we suggest the implications for developing and implementing appropriate policies for anti-piracy.

A Study on Position Matching Technique for 3D Building Model using Existing Spatial Data - Focusing on ICP Algorithm Implementation - (기구축 공간데이터를 활용한 3차원 건물모델의 위치정합 기법 연구 - ICP 알고리즘 구현 중심으로 -)

  • Lee, Jaehee;Lee, Insu;Kang, Jihun
    • Journal of Cadastre & Land InformatiX
    • /
    • v.51 no.1
    • /
    • pp.67-77
    • /
    • 2021
  • Spatial data is becoming very important as a medium that connects various data produced in smart cities, digital twins, autonomous driving, smart construction, and other applications. In addition, the rapid construction and update of spatial information is becoming a hot topic to satisfy the diverse needs of consumers in this field. This study developed a software prototype that can match the position of an image-based 3D building model produced without Ground Control Points using existing spatial data. As a result of applying this software to the test area, the 3D building model produced based on the image and the existing spatial data show a high positional matching rate, so that it can be widely used in applications requiring the latest 3D spatial data.

Analysis and Improved Solution of Hussian et al.'s Authentication Protocol for Digital Rights Management

  • Mi-Og Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.67-74
    • /
    • 2023
  • In this paper, we analyze the authentication protocol for DRM proposed by Hussain et al. in 2022, and present an improved solution. Hussain et al. argued that their authentication protocol guarantees man-in-the-middle attack, replay attacks, and mutual authentication. However, as a result of analyzing Hussain et al.'s authentication protocol in this paper, Hussain et al.'s authentication protocol still has an insider attack problem, a problem with Yu et al.'s authentication protocol that they pointed out. For this reason, when an inside attacker acquires information on a mobile device, a user impersonation attack was also possible. In addition, there were problems with the user's lack of ID format verification and the problem of the secret key mismatch of the digital contents between the server and the user. Therefore, this paper proposes an improved solution to solve these problems. As a result of analysis in this paper, the improved solution is safe from various attacks such as smart card attack, insider attack, and password guessing attack and can safely authenticate users of DRM.

Executives' Characteristics and Their Management Implications in Korean Entertainment Companies (우리나라 엔터테인먼트 기업의 임원 특성과 경영 함의점)

  • Kim, Jeong-Seob
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.3
    • /
    • pp.77-89
    • /
    • 2019
  • What are the characteristics of firm executives who have led the fast-growing Korean entertainment industry since the Korean Wave in the early 2000s, and what management implications can be inferred from them? To search for the answer to these questions, we conducted a complete survey of 293 executives from 27 listed Korean entertainment companies. Research has shown that career path diversity has increased in order of general enterprise managers, IT experts, accountants, lawyers and artists, away from the limited human resources level around artists. Thirty three percent of the firms gave stock options to their CEO. This is a positive aspect as data implying that these companies have been striving to do specialization, transparent management, digital and network management, creativity management, and motivational management in the context of sustainablity. However, it was pointed out as an improvement task that the percentage of young(20s and 30s) and female executives is low, even though such people's creativity, sensitivity, initiative and dynamic quality are apt to bring out their advantages especially in the entertainment company, a typical knowledge-creative firms and that the period of the CEO's average tenure was relatively short to 4.02 years.

Emotional Machines That Attract Human (인간을 매혹한 감정 기계)

  • Oh, Youn-Ho
    • Journal of Popular Narrative
    • /
    • v.25 no.2
    • /
    • pp.9-32
    • /
    • 2019
  • This paper tried to analyze the post-human phenomenon of our age with a focus on the 'emotional machine' motif. The post-humans of our time are closely linked to the creatures in very old storie. The post-human concept is based on the universal and intellectual imagination of humanity that is shared beyond humanities and technical civilizations, cultural and historical boundaries between East and West. This paper is about the creatures from mythical stories that have fascinated human beings, the mechanical humans who brought fear through the sophisticated mechanism of technology civilization era, the post humans. Through my process of looking at the post humans, I sought to clarify the conditions of the sensitivity and humanity of the age. In the process, we come to understand the vagueness of the boundaries between human beings, nature, and machines, and study the coexistence of humans, nature, and machines in the post-human era of the 21st century, beyond the limitations of human-centered humanity.