• Title/Summary/Keyword: 버전

Search Result 1,895, Processing Time 0.024 seconds

A Study of Influence Factors that effect on Consumer Fatigue in the Adoption of Convergence Products (컨버전스 제품 수용에 있어 소비자의 기능적 피로에 영향을 미치는 요인에 대한 연구)

  • Kim, Moon-Tae
    • Management & Information Systems Review
    • /
    • v.32 no.2
    • /
    • pp.83-106
    • /
    • 2013
  • This study testified the influence factors like quantities of advertising, number of hardware and software that are converged, effect on feature fatigue of convergence product. When consumers perceive higher numbers of hardwares in a smart phone, they feel its higher usefulness and complexity. This means that numbers of hardwares is the major factor that enhances consumer's usefulness but, at the same time, it cause perceived leads to higher usefulness in using smart phone, it didn't effect on complexities. It is also important strategy for smart phone companies to provide a lot of useful softwares(applications) to satisfy consumers. Finally, complexity was important factor that lead to higher feature fatigue of consumers. This indicates that smart phone companies have to find adequate numbers of convergence for their new smart phone.

  • PDF

An Exploratory Study of Privacy Issues and Concerns in the Digital Convergence Environment (디지털 컨버전스 환경에서의 프라이버시 이슈와 프라이버시 침해 우려)

  • Bang, Young-Sok;Lee, Dong-Joo;Ahn, Jae-Hyeon
    • Information Systems Review
    • /
    • v.11 no.2
    • /
    • pp.91-111
    • /
    • 2009
  • Collection and use of personal information have enabled firms to improve their value propositions by offering personalization. On the other hand, they have caused widespread concerns by consumers that their privacy is invaded. Because previously distributed personal information can be integrated and utilized to offer more personalized services, those concerns may be intensified with the progress of the digital convergence environment. In this study, factors for privacy invasion and their impact on the privacy concerns are suggested. Then, an empirical study is conducted to examine some of the suggestions. From the analysis, several results are derived. First, as more personal data are collected, secrecy and autonomy concerns increase exponentially rather than steadily. Second, as targeting accuracy is improved, greater secrecy and autonomy concerns are expressed by consumers, but less seclusion concerns. Finally, monetary reward such as coupons can reduce seclusion concerns when targeting accuracy is high. Based on the results, implications for managing consumer privacy concerns are provided under digital convergence environment.

Layered Authoring of Cyber Warfare Training Scenario (계층적 사이버전 훈련 시나리오 저작)

  • Song, Uihyeon;Kim, Donghwa;Ahn, Myung Kil
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.191-199
    • /
    • 2020
  • Cyber warfare training is a key factor for boosting cyber warfare competence. In general, cyber warfare training is conducted by scenarios, and the effects of training can be enhanced by including various elements in the scenarios that can improve the quality of training. In this paper, we introduce the training information, network map, traffic generation policy, threat/defense behavior identified as elements to be included in training scenarios, and propose a method of authoring training scenarios by layering and combining them. We also propose a database design for integrated management of each scenario layer. The layered training scenario authoring method has the advantage of increasing convenience of authoring by reusing existing layers and extending training scenarios based on various combinations between the layers.

A Study on Battle Damage Assessment of Electronic Warfare associated with Cyber Warfare (사이버전 연계 전자전 전투피해평가 지표 산출을 위한 연구)

  • Choi, Seungcheol;Cho, Joonhyung;Kwon, Oh-Jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.201-210
    • /
    • 2020
  • This paper proposes a framework for the battle damage assessment (BDA) of electronic warfare linked to cyber warfare. Thanks to the rapid development of information and communication technology, the importance of cyber warfare and electronic warfare in cyberspace is increasing. Therefore, the BDA for cyber warfare and its associated electronic warfare in cyberspace is an important factor that affects the success or failure of military operations. In this paper, we propose a method to calculate measure of performance and measure of effectiveness by classifying the electronic warfare system into large / medium / small classes according to the type of electronic warfare. By setting up a hypothetical scenario, we show the effectiveness of the proposed framework.

Design of Component Version Management using Reuse Business Model (재사용 비즈니스 모델을 이용한 컴포넌트 버전 관리 설계)

  • Kim, Young-Sun;Oh, Sang-Yeob;Jang, Deog-Chul
    • The KIPS Transactions:PartD
    • /
    • v.10D no.1
    • /
    • pp.67-76
    • /
    • 2003
  • The reuse of software is to use the components of software to be made beforehand to improve the productivity of it. The development of electronic commerce requires it which can be shown from changing the change of business models Reuse is the necessary solution to cope with a rapid change in the electronic commercial transaction. These reuse business models have the defects that they are not offered from version management. This paper has the purpose that by doing the supplementation of defects not to be offered from the version management and by introducing the quick change management about reuse business models, reusing the components and saving a development and reducing a development af period. The reuse of components by the new reuse business models has the advantages to minimize the danger elements from the design to the finish. We use the version management and try to present the method to make the efficiency of reuse by introducing components and managing the elements about components to the version in the technique to accomplish the reuse of software.

Query processing model for Internet ontology data change (인터넷 온톨로지 데이터 변화에 따른 질의 처리 모델 개발)

  • Oh, Sung-Kyun;Kim, Byung-gon
    • Journal of Digital Contents Society
    • /
    • v.17 no.1
    • /
    • pp.11-21
    • /
    • 2016
  • To provide more efficient and exact search result, internet systems will rely more and more on semantic web. Ontology is one of the important methods for implementation of semantic web. Ontology is used to implement an explicit formal vocabularies to share. However, important problems rise when dealing with ontology. Ontologies are typically subject to change because they are living. In order to handle ontology data change situation, a version handling system is needed to keep track of changes. For example, the queries subject to the previous ontology may become inconsistent and must be updated according to the newest version of ontology. Although many research was done in this area, there are still many problems to overcome. In this paper, we propose class and property transition graph for query transformation. The graph is created when ontology data is changed and applied to query transformation.

Validation of ebXML BPSS Instances Based on Semantic Constraints (의미제약 기반의 ebXML BPSS 사례 검증)

  • Kim, Hyoung-Do;Kim, Jong-Woo
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.4
    • /
    • pp.1-18
    • /
    • 2005
  • In ebXML, a representative framework for electronic commerce, a BPS (Business Process Specification) should be finally defined as an instance of XML-version BPSS for the configuration of B2B (Business to Business) runtime systems . In order to define the instance more complete and consistent, it is required to validate all the semantic constraints on the instance . Due to the limitations of XML Schema constructs, however, current XML-version BPSS fails to specify formal semantic constraints completely. This paper presents how to find, express and reuse BPSS semantic constraints that could not be explicitly defined in the XML-version BPSS. The method facilitates the validation of XML-version BPSS instances easily with some useful guides for fixing violations of semantic constraints. Furthermore, B2B business processes can be standardized and applied more efficiently and effectively.

  • PDF

A Study on the Efficient Configuration Thread Control Modeling in Version Control using Object Oriented System (객체지향 시스템을 이용한 버전제어에서 효율적인 형상 형성 제어 모델링에 관한 연구)

  • Oh, Sang-Yeob
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.123-132
    • /
    • 2005
  • A version control system is used in a rapidly changed environment or a program which developed in a complicated environment. And configuration thread information supporting and it's processing method has an important part in version control. Configuration thread tool such as a system model of DSEE, a view of ClearCase, a label of SourceSafe, and the package of CCC/Harvest have applied to formalized configuration rule by user and obtained a desired configuration information of the version. But it is a problem of configuration thread in supporting information that we. in this method. can't know a exactly well-defined configuration rule information and a predefined information. And these information have a demerit that can't supported the close connection along with undefined version and a meta-information. In this paper. we have modeling a system for these problems to solve and a efficiently configuration thread supported. We also proposed a mixed retrieval model included a boolean retrieval model and a vector retrieval model for support efficiently configuration thread information. We applied and designed the libraries using extended facet method.

  • PDF

Schema management skills for semantic web construction (시멘틱웹 구축을 위한 스키마 관리 기법 연구)

  • Kim, Byung-Gon;Oh, Sung-Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.9-15
    • /
    • 2007
  • As the information of the internet increased, importance of sematic web for collecting and integration of these informations to support decision making of some group or ordinary people are growing as well. Basis structure that composes semantic web is ontology and languages like XML, RDF/RDF schema and OWL are basis means that compose ontology schema. When composes and manages Ontology schema, one of the important consideration point is that schema is changed as times go by. Therefore, change of domain of schema, change of data concept or change of relation between resource etc. are reflected in the ontology system. In this study, we suggest semantic web schema management skill in terms of version management. We categorized version change forms and created version graph for checking of version transition. With created version graph, we define transitivity rule and propose schema tag for detail application which enables extending of applicable version schema.

  • PDF

Architecture Design for RSIM version 1.3 based Software RS and IM (RSIM 버전 1.3 기반의 소프트웨어 RS, IM 아키텍처 설계)

  • Jang, Wonseok;Kim, Youngki;Seo, Kiyeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.9
    • /
    • pp.2124-2130
    • /
    • 2014
  • The standard for DGPS reference station system defined by RTCM is in the current version of 1.2. This standard currently supports only GPS of the United States. However, the current operating GNSS satellite consisted of not only GPS, but also GALILEO of Europe, GLONASS of Russia, QZSS of Japan, BeiDou of China and so on. Therefore, the existing standard is not able to support them. Accordingly, a new standard in the version of RTCM's RSIM 1.3 is established in order to provide correctional services to GNSS satellites. In this paper, the version of RSIM 1.3 is analyzed and the software for DGNSS reference station architecture supporting the version of RSIM 1.3 is designed.