• Title/Summary/Keyword: 사용자 개인정보

Search Result 3,222, Processing Time 0.037 seconds

Electronic-Composit Consumer Sentiment Index(CCSI) development by Social Bigdata Analysis (소셜빅데이터를 이용한 온라인 소비자감성지수(e-CCSI) 개발)

  • Kim, Yoosin;Hong, Sung-Gwan;Kang, Hee-Joo;Jeong, Seung-Ryul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.121-131
    • /
    • 2017
  • With emergence of Internet, social media, and mobile service, the consumers have actively presented their opinions and sentiment, and then it is spreading out real time as well. The user-generated text data on the Internet and social media is not only the communication text among the users but also the valuable resource to be analyzed for knowing the users' intent and sentiment. In special, economic participants have strongly asked that the social big data and its' analytics supports to recognize and forecast the economic trend in future. In this regard, the governments and the businesses are trying to apply the social big data into making the social and economic solutions. Therefore, this study aims to reveal the capability of social big data analysis for the economic use. The research proposed a social big data analysis model and an online consumer sentiment index. To test the model and index, the researchers developed an economic survey ontology, defined a sentiment dictionary for sentiment analysis, conducted classification and sentiment analysis, and calculated the online consumer sentiment index. In addition, the online consumer sentiment index was compared and validated with the composite consumer survey index of the Bank of Korea.

Interoperable Security Framework for Heterogeneous IoT Platforms (이종 사물인터넷 플랫폼 간 보안 상호운용을 위한 프레임워크)

  • Oh, Se-Ra;Kim, Young-Gab
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.3
    • /
    • pp.81-90
    • /
    • 2018
  • Due to the dramatic advancement of IoT (Internet of Things), it is expected that tens of billions of IoT devices will be connected by the year 2024. Furthermore, as IoT technologies evolves, the security management in IoT platforms has become a critical issue. For example, there are interworking problems between heterogeneous IoT platforms caused by differences from communication protocols, security policies, etc. in each platform. In addition, unsecured interworking can cause major security issues including the information leakage. In this paper, in order to solve these problems, a security interworking architecture is proposed and implemented in both FIWARE and oneM2M, which are representative IoT platforms. First, the security architecture of FIWARE is analyzed and implemented, and then the security framework based on OAuth 2.0 is developed on Mobius platform. Finally, in order to validate the proposed security interworking architecture, a LED (Light-Emitting Diode) example, where the LED is controlled by only authorized users, is developed. The proposed architecture can be extended to the diverse IoT platforms and devices.

Implementation of a DB-Based Virtual File System for Lightweight IoT Clouds (경량 사물 인터넷 클라우드를 위한 DB 기반 가상 파일 시스템 구현)

  • Lee, Hyung-Bong;Kwon, Ki-Hyeon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.311-322
    • /
    • 2014
  • IoT(Internet of Things) is a concept of connected internet pursuing direct access to devices or sensors in fused environment of personal, industrial and public area. In IoT environment, it is possible to access realtime data, and the data format and topology of devices are diverse. Also, there are bidirectional communications between users and devices to control actuators in IoT. In this point, IoT is different from the conventional internet in which data are produced by human desktops and gathered in server systems by way of one-sided simple internet communications. For the cloud or portal service of IoT, there should be a file management framework supporting systematic naming service and unified data access interface encompassing the variety of IoT things. This paper implements a DB-based virtual file system maintaining attributes of IoT things in a UNIX-styled file system view. Users who logged in the virtual shell are able to explore IoT things by navigating the virtual file system, and able to access IoT things directly via UNIX-styled file I O APIs. The implemented virtual file system is lightweight and flexible because it maintains only directory structure and descriptors for the distributed IoT things. The result of a test for the virtual shell primitives such as mkdir() or chdir() shows the smooth functionality of the virtual file system, Also, the exploring performance of the file system is better than that of Window file system in case of adopting a simple directory cache mechanism.

Analysis of Feature Map Compression Efficiency and Machine Task Performance According to Feature Frame Configuration Method (피처 프레임 구성 방안에 따른 피처 맵 압축 효율 및 머신 태스크 성능 분석)

  • Rhee, Seongbae;Lee, Minseok;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.27 no.3
    • /
    • pp.318-331
    • /
    • 2022
  • With the recent development of hardware computing devices and software based frameworks, machine tasks using deep learning networks are expected to be utilized in various industrial fields and personal IoT devices. However, in order to overcome the limitations of high cost device for utilizing the deep learning network and that the user may not receive the results requested when only the machine task results are transmitted from the server, Collaborative Intelligence (CI) proposed the transmission of feature maps as a solution. In this paper, an efficient compression method for feature maps with vast data sizes to support the CI paradigm was analyzed and presented through experiments. This method increases redundancy by applying feature map reordering to improve compression efficiency in traditional video codecs, and proposes a feature map method that improves compression efficiency and maintains the performance of machine tasks by simultaneously utilizing image compression format and video compression format. As a result of the experiment, the proposed method shows 14.29% gain in BD-rate of BPP and mAP compared to the feature compression anchor of MPEG-VCM.

UX Design of Mobile Banking Usage Improvement for Seniors (시니어들을 위한 모바일 뱅킹 이용률 개선을 위한 UX 디자인)

  • Jongbin Lee;Homin Boun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.7
    • /
    • pp.325-332
    • /
    • 2023
  • Currently, the world's population has already entered a super-aging era, and the rate is expected to increase rapidly to about 40% by 2050. However, the rapid development of automation technology and the online service sector, the main technologies of the Fourth Industrial Revolution, are still further isolating them in a world where many inconveniences and development technologies are applied. As such, alienation in daily life is widely expanded in various fields, but the financial service sector is one of the must-use areas regardless of age because of its strong nature in the public service sector, and is a very important factor in the period when branches are rapidly decreasing. However, the current utilization rate of mobile banking services is not around 5%, so users over 60 are rarely able to use them. The UX design of the most frequently used remittance service screen in mobile banking services was proposed, and the difficulty of trying to find the preferred bank among 56 or more banks was solved by analyzing the usage rate of each bank and dividing it into three stages by age group from 50 or older. In addition, it was designed to strengthen customized services by showing their recently used banks as the top priority. The design proposed in this study obtained an average of 4.8 points or more out of 5 points as a result of usability satisfaction through interviews with less than 50 senior groups. This study is believed to help each bank upgrade its different mobile banking designs in a unified manner.

S-MADP : Service based Development Process for Mobile Applications of Medium-Large Scale Project (S-MADP : 중대형 프로젝트의 모바일 애플리케이션을 위한 서비스 기반 개발 프로세스)

  • Kang, Tae Deok;Kim, Kyung Baek;Cheng, Ki Ju
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.8
    • /
    • pp.555-564
    • /
    • 2013
  • Innovative evolution in mobile devices along with recent spread of Tablet PCs and Smart Phones makes a new change not only in individual life but also in enterprise applications. Especially, in the case of medium-large mobile applications for large enterprises which generally takes more than 3 months of development periods, importance and complexity increase significantly. Generally Agile-methodology is used for a development process for the medium-large scale mobile applications, but some issues arise such as high dependency on skilled developers and lack of detail development directives. In this paper, S-MADP (Smart Mobile Application Development Process) is proposed to mitigate these issues. S-MADP is a service oriented development process extending a object-oriented development process, for medium-large scale mobile applications. S-MADP provides detail development directives for each activities during the entire process for defining services as server-based or client-based and providing the way of reuse of services. Also, in order to support various user interfaces, S-MADP provides detail UI development directives. To evaluate the performance of S-MADP, three mobile application development projects were conducted and the results were analyzed. The projects are 'TBS(TB Mobile Service) 3.0' in TB company, mobile app-store in TS company, and mobile groupware in TG group. As a result of the projects, S-MADP accounts for more detailed design information about 'Minimizing the use of resources', 'Service-based designing' and 'User interface optimized for mobile devices' which are needed to be largely considered for mobile application development environment when we compare with existing Agile-methodology. Therefore, it improves the usability, maintainability, efficiency of developed mobile applications. Through field tests, it is observed that S-MADP outperforms about 25% than a Agile-methodology in the aspect of the required man-month for developing a medium-large mobile application.

Social Tagging-based Recommendation Platform for Patented Technology Transfer (특허의 기술이전 활성화를 위한 소셜 태깅기반 지적재산권 추천플랫폼)

  • Park, Yoon-Joo
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.3
    • /
    • pp.53-77
    • /
    • 2015
  • Korea has witnessed an increasing number of domestic patent applications, but a majority of them are not utilized to their maximum potential but end up becoming obsolete. According to the 2012 National Congress' Inspection of Administration, about 73% of patents possessed by universities and public-funded research institutions failed to lead to creating social values, but remain latent. One of the main problem of this issue is that patent creators such as individual researcher, university, or research institution lack abilities to commercialize their patents into viable businesses with those enterprises that are in need of them. Also, for enterprises side, it is hard to find the appropriate patents by searching keywords on all such occasions. This system proposes a patent recommendation system that can identify and recommend intellectual rights appropriate to users' interested fields among a rapidly accumulating number of patent assets in a more easy and efficient manner. The proposed system extracts core contents and technology sectors from the existing pool of patents, and combines it with secondary social knowledge, which derives from tags information created by users, in order to find the best patents recommended for users. That is to say, in an early stage where there is no accumulated tag information, the recommendation is done by utilizing content characteristics, which are identified through an analysis of key words contained in such parameters as 'Title of Invention' and 'Claim' among the various patent attributes. In order to do this, the suggested system extracts only nouns from patents and assigns a weight to each noun according to the importance of it in all patents by performing TF-IDF analysis. After that, it finds patents which have similar weights with preferred patents by a user. In this paper, this similarity is called a "Domain Similarity". Next, the suggested system extract technology sector's characteristics from patent document by analyzing the international technology classification code (International Patent Classification, IPC). Every patents have more than one IPC, and each user can attach more than one tag to the patents they like. Thus, each user has a set of IPC codes included in tagged patents. The suggested system manages this IPC set to analyze technology preference of each user and find the well-fitted patents for them. In order to do this, the suggeted system calcuates a 'Technology_Similarity' between a set of IPC codes and IPC codes contained in all other patents. After that, when the tag information of multiple users are accumulated, the system expands the recommendations in consideration of other users' social tag information relating to the patent that is tagged by a concerned user. The similarity between tag information of perferred 'patents by user and other patents are called a 'Social Simialrity' in this paper. Lastly, a 'Total Similarity' are calculated by adding these three differenent similarites and patents having the highest 'Total Similarity' are recommended to each user. The suggested system are applied to a total of 1,638 korean patents obtained from the Korea Industrial Property Rights Information Service (KIPRIS) run by the Korea Intellectual Property Office. However, since this original dataset does not include tag information, we create virtual tag information and utilized this to construct the semi-virtual dataset. The proposed recommendation algorithm was implemented with JAVA, a computer programming language, and a prototype graphic user interface was also designed for this study. As the proposed system did not have dependent variables and uses virtual data, it is impossible to verify the recommendation system with a statistical method. Therefore, the study uses a scenario test method to verify the operational feasibility and recommendation effectiveness of the system. The results of this study are expected to improve the possibility of matching promising patents with the best suitable businesses. It is assumed that users' experiential knowledge can be accumulated, managed, and utilized in the As-Is patent system, which currently only manages standardized patent information.

How Does Technostress Influence Employees' Role and Performance in An Organization?: The Moderating Effect of Innovation Support (조직 내 기술스트레스가 역할과 성과에 미치는 영향: 혁신지원의 조절효과)

  • Kim, Geuna;Kim, Sanghyun
    • Information Systems Review
    • /
    • v.16 no.2
    • /
    • pp.97-124
    • /
    • 2014
  • This study applies the concepts of sociotechnical theory and role theory in order to verify the effects of stress (that is, technostress) created from information and computer technology (ICT) concerning role stress and performance. We suggest diverse perspectives concerning the elements leading to technostress along with the stress-creating process of ICT among organizational members. The following four major hypotheses are proposed: (1) Technostress is positively related to role stress (e.g., conflict and overload of roles), adverse psychological outcomes, and adverse IS use related outcomes, (2) Role conflict is positively related to adverse psychological outcomes and adverse IS use related outcomes, (3) Role overload is positively related to adverse psychological outcomes and adverse IS use related outcomes, and (4) Innovation support will play as a moderator between technostress, roles tress, adverse psychological outcomes and adverse IS use related outcomes. A partial least square (PLS) with data gathered data from ICT users of organizations was used to verify the proposed hypotheses. The results supported our claims excluding the hypothesis associated to the relationship between technostress and role stress. We suggest a theoretical implication based on the verification of technostress related to the current concept of stress experienced by individuals within organizations. We also propose that a practical implication concerning the opposite effect of technostress, can be utilized as a method of reducing role stress, and suggests a diagnostic tool for assessing the degree of technostress within organizations.

A Study on the Antecedents and Outcomes of E-Trust (E-Trust의 선행요인과 결과요인 간의 구조적 관계에 관한 연구)

  • Han, Sang-Lin;Sung, Hyung-Suk
    • Journal of Global Scholars of Marketing Science
    • /
    • v.17 no.1
    • /
    • pp.101-122
    • /
    • 2007
  • Recently, as internet shopping mall users rapidly, a form of shopping changed from off line to on line. The rapid growth of customers and transaction volume through evolution of new media, internet, brings new problems to internet marketers. It is the most important task that how internet shopping mall operators obtain their customers trust and repeat buying. This empirical research investigates online shoppers for their trust dimensions for online retailers. The study aimed to determine whether e-trust antecedents(perceived reputation, perceived quality, perceived value) influence trust dimension and whether the multidimensional trust contributed differently to perceived risk and willingness to depend on e-retailers. Consequences of the research are as follows: First, it reveals that of reputation, web site quality of the internet shopping mall have influence upon trust dimension. Second, the higher level of trust consumers have, the higher level of willingness to depend and intent to revisit on the retailers they have. But level of perceive risk consumers have not influences on willingness to depend on the retailers. It is necessary for internet shopping mall to development its reputation and familiarity to obtain customer's trust. Accordingly, this research will be helping internet shopping mall insight for marketing strategies, constantly should study about action and mind of consumer.

  • PDF

Application of AI based Chatbot Technology in the Industry

  • Park, Arum;Lee, Sae Bom;Song, Jaemin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.17-25
    • /
    • 2020
  • Based on the successful use of chatbot technology, this study examined what business values each company is creating. The chatbot service contributes to improving the productivity of the company by helping to answer or respond to the questions of employees inside the company or customers. And in the field of education, Instead of instructor, AI technology responds the questions and feedback of the students to reduce the work of the instructor. In the field of commerce, offline stores provide convenient and new purchasing experiences to customers by providing product purchasing services through artificial intelligence speakers and personalization service. Although chatbot service is creating business value in some business cases, it is still limited to the process of a specific company, and the spread rate is still slowing because the service scope, convenience, and usefulness are not greater than expected. Therefore, some chatbot development service providers is providing an integrated development platform to improve usability, Chatbots have the features and advantages of providing convenience instead of answering human questions. However, there is a disadvantage that the level of communication can be lowered by reducing various human subjective views and giving mainly objective answers. Through this study, we will discuss the characteristics, advantages and disadvantages of chatbot services by comparing them.