• Title/Summary/Keyword: 정보탐색행위

Search Result 159, Processing Time 0.028 seconds

A Study about Impact of Mindfulness on Perceived Factors of Information Technology Acceptance (마음챙김이 정보기술 수용의 인지적 요인에 미치는 영향 연구)

  • Hyun Mo Kim;Ying Ying Pang;Joo Seok Park
    • Information Systems Review
    • /
    • v.21 no.1
    • /
    • pp.1-22
    • /
    • 2019
  • Mindfulness is the process of actively noticing new things. Today, companies have introduced and run mindfulness programs because the mindfulness has possible applications of productivity and innovation in corporation. However, role of mindfulness has not been clearly investigated in behavior research of Information System. The purpose of this study is to confirm the effects of mindfulness on technology acceptance process. Based on UTAUT Model, we examined how mindfulness in technology acceptance process moderate antecedent factors of acceptance intentions and use behavior. For empirical research, we conducted a survey on acceptance of smart watch of internet of things for employees of companies applying the mindfulness programs. then, we analyzed survey sample in empirical methodologies. Based on the empirical analysis, cognizance of alternative technologies in mindfulness factors increased the impact of performance expectancy on acceptance intention. Novelty seeking in mindfulness factors increased the impact of effort expectancy on acceptance intention. Awareness of local context in mindfulness factors decreased the impact of social influence on acceptance intention. engagement with technology in mindfulness factors increased the impact of facilitating conditions on use behavior. This study suggests academic implications and practical implications based on the results of the research. The implications will help to support and extend the theory of technology acceptance model while providing practical insights for IT acceptance by suggesting ways to utilize mindfulness in corporation.

Design and Implementation of Differencing and Merging Scheme for Cooperative Version Control System (협동 버전제어 시스템을 위한 버전충돌 인지 및 버전병합 기능의 설계와 구현)

  • Lee, Byong-Gul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.126-134
    • /
    • 2000
  • Version control is an application to maintain consistency between different instances of the same document allowing operations such as navigation, differencing, and merging. Most version control systems, however, lack the support of functionality for cooperative writing environment, such as to represent and store the history of the actions of different individuals, to effectively differentiate and merge the individual actions including the text object, and to manage different access privileges for different granularity and individuals. With the help of Activity IDentification (AID) tag and its unique addressing scheme proposed in this paper, differencing and merging become simple and effective. Access and role control is improved by associating the access right table and role assignment in AID scheme also eliminates the requirements for large storage capacity for version information maintenance.

  • PDF

Pattern Generation for Coding Error Detection in VHDL Behavioral-Level Designs (VHDL 행위-레벨 설계의 코딩오류 검출을 위한 패턴 생성)

  • Kim, Jong-Hyeon;Park, Seung-Gyu;Seo, Yeong-Ho;Kim, Dong-Uk
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.3
    • /
    • pp.185-197
    • /
    • 2001
  • Recently, the design method by VHDL coding and synthesis has been used widely. As the integration ratio increases, the amount design by VHDL at a time also increases so many coding errors occur in a design. Thus, lots of time and effort is dissipated to detect those coding errors. This paper proposed a method to verify the coding errors in VHDL behavioral-level designs. As the methodology, we chose the method to detect the coding error by applying the generated set of verifying patterns and comparing the responses from the error-free case(gold unit) and the real design. Thus, we proposed an algorithm to generate the verifying pattern set for the coding errors. Verifying pattern generation is peformed for each code and the coding errors are classified as two kind: condition errors and assignment errors. To generate the patterns, VHDL design is first converted into the corresponding CDFG(Control & Data Flow Graph) and the necessary information is extracted by searching the paths in CDFG. Path searching method consists of forward searching and backward searching from the site where it is assumed that coding error occurred. The proposed algorithm was implemented with C-language. We have applied the proposed algorithm to several example VHDL behavioral-level designs. From the results, all the patterns for all the considered coding errors in each design could be generated and all the coding errors were detectable. For the time to generate the verifying patterns, all the considered designed took less than 1 [sec] of CPU time in Pentium-II 400MHz environments. Consequently, the verification method proposed in this paper is expected to reduce the time and effort to verify the VHDL behavioral-level designs very much.

  • PDF

Attack Tree System for Predicting Target of Attempted Attack (미수 공격의 목표를 예측하기 위한 공격트리 시스템)

  • Song, Kyoungjin;Shin, Dongkyoo;Shin, Dongil
    • Annual Conference of KIPS
    • /
    • 2017.04a
    • /
    • pp.201-202
    • /
    • 2017
  • 정보통신 시스템이 나날이 발전하고 거대화되면서 해킹시도 또한 기하급수적으로 늘어나고 있다. 그러나 해킹 시도의 대다수는 성공으로 이어지지 않고, 단순의 탐색 경우가 대다수이다. 따라서 미수로 끝난 공격에서 공격 경로 및 공격 목표를 예측함으로써 추가적인 공격에 대비할 수 있는 시스템을 구축할 필요성이 있다. 그러므로 본 논문에서는 포렌식 분석, 해커의 문서, 보안 보고서 등을 토대로 공격 행위, 공격 결과 및 목표 등과 같은 공격 정보를 수집하고 공격트리를 만들어 레지스트리 정보, 프로세스 정보, 보안 로그 등과 같은 시스템 정보를 토대로 공격 목표를 찾는 시스템을 제안한다.

A Study on Legal Limitations of Teachers' Right for Expression (초.중.고교 교원의 정치적 표현과 제한법리에 관한 탐색적 연구: '시국선언' 관련 판례를 중심으로)

  • Lee, Jae-Jin;Lee, Jeong-Ki
    • Korean journal of communication and information
    • /
    • v.54
    • /
    • pp.32-57
    • /
    • 2011
  • This study examined how the Korean courts have made a balance between rights of school teachers' expression and the public interests derived from regulating their rights for expression in related cases. Under the Korean laws such as National Public Service Law and the Law on Assembly and Demonstration, school teachers are considered as civil servants and basically not allowed to assemble to demonstrate for their own interests. The analysis revealed that in 24 cases from a total of 31 teacher-related court cases, teachers were found guilty in violation of related laws. In deciding whether the teachers' participation on anti-government assembly was guilty or not, the courts put an emphasis on public purpose of their expression, the degree to which their expressions affect the society, and specific contents of their expression. Conclusively, it was found out that in applying the related law, Korean courts tend to overweigh the public interests, rather than the teachers' right to express.

  • PDF

Research on the Variables Affecting the Online Flaming: Centering on the Social Influence Model (플레이밍(Flaming)에 영향을 끼치는 변인에 관한 연구 - 사회적 영향 모델을 중심으로 -)

  • Shim, Jae Woong;Kim, Jin Hee
    • Informatization Policy
    • /
    • v.20 no.4
    • /
    • pp.51-70
    • /
    • 2013
  • The flaming which is defined as posting deliberately hostile messages online has been perceived as one of the most dangerous behaviors on the Internet. Although the previous research on flaming focused on finding the effects of anonymity and individual differences, more comprehensive explanation is still needed. This research attempted to find social variables which affect the attitude toward and the act of flaming based on the differences between high school and college students. Findings show that both high school and college students are strongly influenced by their affiliated groups in the intention to commit online flaming and past experiences of the number of the acts of flaming. At the same time, vicarious learning was positively associated with high school students, but direct utterance was positively associated with college students. The implications of the study was also discussed.

  • PDF

A Comparative Study on Metasearch System and Google Scholar in the Digital Library Environment (디지털도서관 환경에서 메타서치시스템과 구글스칼라에 관한 비교 연구)

  • Yang, Ji-Ann;Nam, Young-Joon
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 2010.08a
    • /
    • pp.45-54
    • /
    • 2010
  • 정보환경의 변화에 따라 도서관과 웹 검색엔진의 차별성이 있음에도 불구하고 이용자들은 인터넷의 자원과 학술데이터베이스의 자원을 혼동하고 있다. 특히 구글스칼라가 갖는 검색속도와 조작의 편의성이라는 장점에 따라 데이터베이스의 학술적 가치에도 불구하고 구글스칼라를 가장 많이 이용하고 있다. 이 연구에서는 구글스칼라가 갖는 장점을 반영한 메타서치시스템의 특성과 가치를 조사하였다. 조사 대상은 메타서치시스템이 갖는 인터페이스 측면과 전자정보원 측면에서 비교 분석하였다. 이러한 새로운 검색채널로써 메타서치시스템을 이용하는 기관의 이용통계를 분석하여, 이를 바탕으로 구글스칼라와 같은 웹 검색엔진이 갖는 이용자선호가치를 수용하는 상황에서 이용자 이용행태 패턴과 주제별 전자정보 탐색 행위 등을 조사하였다.

  • PDF

Optimal solution search method by using modified local updating rule in Ant Colony System (개미군락시스템에서 수정된 지역 갱신 규칙을 이용한 최적해 탐색 기법)

  • Hong, Seok-Mi;Chung, Tae-Choong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.1
    • /
    • pp.15-19
    • /
    • 2004
  • Ant Colony System(ACS) is a meta heuristic approach based on biology in order to solve combinatorial optimization problem. It is based on the tracing action of real ants which accumulate pheromone on the passed path and uses as communication medium. In order to search the optimal path, ACS requires to explore various edges. In existing ACS, the local updating rule assigns the same pheromone to visited edge. In this paper, our local updating rule gives the pheromone according to the number of visiting times and the distance between visited cities. Our approach can have less local optima than existing ACS and find better solution by taking advantage of more informations during searching.

A Study on De Navigation Tools for Electronic Documents Based on Cognitive Process (인지과정을 고려한 전자문헌의 내비게이션 도구에 관한 고찰)

  • Lee, Byeong-Ki
    • Journal of Information Management
    • /
    • v.30 no.1
    • /
    • pp.48-67
    • /
    • 1999
  • In an advanced computer and information network technologies, users are rapidly approaching environment in which information will be created, delivered, managed and stored, using vastly different methods to traditional pap r based systems. Information seeking behavior contains not only physical access, but also cognitive process in which reading, viewing, analyzing, reasoning etc. The most Important factor determining the usability of electronic documents is cognitive process. But, currently Navigation tools for using electronic documents depend on physical searching without considering cognitive process. Therefore, this study examined feasibility of using overal cognitive process in developing navigation tools. Six cognitive process style have been analyzed to find common skill of information seeking process. Also this study suggests skills that needs to introduce to functions of navigation tool, such as searching, filtering, visualization, traversal, content structure.

  • PDF

An Exploratory Study on the Current Status of Research Ethics in Higher Education and Its Improvement Methods -With a focus on DEVAC Paper Plagiarism Detection System- (대학교육에서의 연구윤리현황과 개선방안에 관한 탐색적 연구 - DEVAC 과제표절탐색 시스템을 중심으로 -)

  • Park, Su-Hong;Jung, Ju-Young
    • Journal of The Korean Association of Information Education
    • /
    • v.12 no.2
    • /
    • pp.183-194
    • /
    • 2008
  • This research was conducted from the perspective of student management focusing on such central topic as realization of research ethics on the basis of research ethics case study model. In this study, improvement method for research ethics education through means of application of DEVAC System, which is a paper plagiarism detection system, and survey on current status of research ethics in college education and degree of consciousness thereof were explored. Through these investigations, a topic relating to establishment of the foundation in order to foster consciousness of research ethics in the college education was established as the primary purpose of this study. To accomplish the purpose of this study, firstly, actual situation of paper plagiarism committed by the college students and their consciousness were surveyed. Secondly, the research ethics education was examined through means of applying DEVAC paper plagiarism detection system. The results from investigations revealed the followings: First, 424 students (65.43%) who participated in this research and survey on the fact of paper plagiarism had experience of report plagiarism, and the result of investigation showed that 49.3% of students among those who had experience of paper plagiarism committed report plagiarism more than three times in a semester. And, 34.1% of participants showed a positive response to the use of a paper plagiarism detection system in the college, and results from the investigation displayed that the creative education (39.0%) marked the highest scores as in the educational method to reinforce the research ethics. Second, the results from examination of paper plagiarism having applied DEVAC system indicated that use of this system can be an alternative to prevent paper plagiarism from students. It is realized through this study that there is a necessity in various respects to build up the foundation which will enable individual students to improve their consciousness to such a degree so as to make them clearly recognize the fact that plagiarism is criminal act.

  • PDF