• Title/Summary/Keyword: 정보행동

Search Result 3,778, Processing Time 0.034 seconds

A study on the individual and group behavior based customer profile model for personalized products recommendation (개인화된 제품 추천을 위한 개인과 그룹 행동에 기반한 고객 프로파일 모델 연구)

  • Park Yu-Jin;Jang Geun-Nyeong;Jeong Yu-Jin
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.05a
    • /
    • pp.1812-1818
    • /
    • 2006
  • 일대일 마케팅을 실현하고 정보 과다 문제의 해결책으로 등장한 추천시스템의 다양한 기법을 적용하기 위해서는 고객의 관심 분야에 대한 정보인 고객 프로파일의 정의가 선행되어야 할 것으로 판단된다. 본 연구에서는 고객에게 개인화된 정보를 추천하기 위해 고객 개인의 행동과 그 고객이 속한 그룹의 행동 정보에 기반한 고객 프로파일 모델인 IGBCPM(Individual Group Behavior Customer Profile Model)을 제시한다.

  • PDF

A Study on Librarian's Job Stress with Black Consumer in Public Libraries (도서관 블랙컨슈머와 사서 스트레스 연구)

  • Sim, Min-Seuk;Nam, Yeong-Joon
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 2015.08a
    • /
    • pp.99-102
    • /
    • 2015
  • 도서관 민원과 이용자 불평행동을 살펴보고, 사서의 직무 불안을 야기하는 이용자 불평행동에 대한 이론적인 접근과 조사를 통해, 도서관 현장에서의 블랙컨슈머와 사서스트레스의 상관성을 분석하고자 한다. 본 논문은 지금까지의 사서의 직무스트레스 관련 연구가 직무스트레스 요인분석, 직무만족과의 관련성을 분석하였다면, 사서 직무에 대한 업무 범위를 좀 더 세분하여 사서의 대민서비스 역할에 주목하고, 도서관의 불량고객의 유형을 파악하여, 감정노동 분야 및 소비자학에서 논의되어 왔던 불평행동에 따른 직무스트레스 부분에 대하여 심도 있게 접근하고자 한다.

  • PDF

Relationship of Ethics Consciousness in Internet and Moral Behavior : Analysis of The Relation among Moral Judgement, Information Ethics Judgement and Internet Ethics Consciousness of Undergraduate Students (인터넷 상에서의 윤리적 인지와 도덕적 행동 관련성 : 대학생의 도덕 판단력과 정보윤리 판단력, 인터넷윤리의식 간의 관계를 바탕으로)

  • Jang, SoonSun;Lee, OkHwa
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.2
    • /
    • pp.11-19
    • /
    • 2014
  • Presently the instructional model for internet ethics education is modeled after the integrated morality. The model is based on the assumption that ethical awareness will lead to ethical activities which is based on the theory that cognition is correlated to the behavioral domains. But the side effects of the information society in the cyber space increased even when the education for the awareness of ethics in the cyber space has been taught more aggressively than before. In this study, the relation of the cognition for information ethics and the ethical behavior in the cyber space was analyzed in order to find out the implications for the effective internet ethics education model. The tools used are the 'DIT (Defining Issues Test)' to measure the behavioral ability in the physical world, the Information Ethics Judgment to measure the behavioral ability in the cyber space, and the self diagnostic tool of 'Internet ethics awareness' to measure the level of cognitive knowledge for internet ethics. The correlation of three measures was analyzed. The results were college students' levels of ethics from three tools from are considerably low. Moral judgement and information ethics judgement were not correlated which means that the behavior in the physical world was not necessarily correlated to the behavior in the cyber space. The three measurements were not statistically significantly correlated. Therefore the cognitive awareness for the information ethics were not necessarily correlated to the ethical behavior in the cyber space. Ethical cognition and the moral behavior need to be taught with equal emphasis as they do not have strong correlation.

  • PDF

An Action Information Management Method for Creating Adaptive NPC (적응형 NPC를 생성하는 행동 정보 관리 기법)

  • Kim, Na-Ra;Um, Ky-Hyun;Cho, Kyung-Eun
    • Journal of Korea Game Society
    • /
    • v.8 no.1
    • /
    • pp.103-113
    • /
    • 2008
  • Although people have had more opportunities to enjoy various types of game, most of players have felt less satisfaction with the games. This is the reason that since most Non-player Characters (NPCs) are simple and uniform, they have some limitations for competing with a variety of players. Thus, technologies for creating intelligent NPCs that can compete with each player at a similar level are required. In this paper, we present an action information management method for creating adaptive NPCs based on the algorithm for calculating their action efficiency. This algorithm is useful to the adaptation method for saving and controlling player-appropriate action. In our method, adaptive NPCs observe the actions of players and collect the relationship data between status and action. The efficiency value of the action data is calculated and data of similar status are grouped, and finally stored at the action database. The game system of NPC updates the action database and stores diverse actions. Then, NPC selects action with high efficiency value. We have tested our algorithm on an action game. A random test subject performed a one-on-one game against an adaptive NPC in real-time. As a result, the action dispositions of both the subject and NPC are analyzed in a log file to determine whether or not the disposition of the subject is similar to that of the NPC. The statistics of the diverse test results shows that NPCs become adaptive to players with error rate within less than 6%.

  • PDF

A Study on Employee's Compliance Behavior towards Information Security Policy : A Modified Triandis Model (조직 구성원의 정보보안정책 준수행동에 대한 연구 : 수정된 Triandis 모델의 적용)

  • Kim, Dae-Jin;Hwang, In-Ho;Kim, Jin-Soo
    • Journal of Digital Convergence
    • /
    • v.14 no.4
    • /
    • pp.209-220
    • /
    • 2016
  • Although organizations are providing information security policy, education and support to guide their employees in security policy compliance, accidents by non-compliance is still a never ending problem to organizations. This study investigates the factors that influence employees' information security policy compliance behavior using elements of Triandis model. We analyzed the relationships among Triandis model's factors using PLS(Partial Least Squares). The result of the hypothesis tests shows that organization can induce individual's information security policy compliance intention and behavior by information security policy and facilitating conditions that support it, and proves the importance of members' expected value, habit and affect about information security compliance. This study is significant in a way that it applies Triandis model in the field of information security, and presents direction for members' information security behavior, and will be able to provide measures to establish organization's information security policy and increase members' compliance behavior.

A Study on the Effects of Information Security Policy Types and Information Security Stress on Information Security Behavior (정보보안 정책 유형과 보안 스트레스가 정보보안 행동에 미치는 영향에 대한 연구)

  • Lee Kwang Ho;Jung Chan gi
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.113-120
    • /
    • 2022
  • Despite the limitations of existing security policies due to technological development, companies are unable to actively respond to changes by maintaining a closed security policy. This study classified information security policy into three types: regulatory type policy, advisory type policy, and informative type policy. For each classified policy type, the effect on the information security policy compliance behavior of organizational members was investigated by applying the extended theory of planned behavior, and the moderating effect of information security stress was investigated. SmartPLS 2.0 and SPSS 21.0, which are structural equation modeling techniques, were used to analyze the relationship affecting each factor. As a result of the study, regulatory type, advisory type, and informative type security policies affected organizational members' information security policy compliance behavior, and security stress had an effect on information security compliance attitudes and subjective norms on information security, which are prerequisites for planned behavior theory. gave. This study suggests that various types of corporate information security policies can be applied and that security stress can affect information security behaviors of members.

An Exploratory Study on the Political Information Behaviors of Korean Opinion Leaders on Twitter: Through the Lens of Theory of Information Worlds (한국의 트위터 오피니언 리더들의 정치적 정보행동에 관한 연구 - 정보세계이론을 중심으로 -)

  • Lee, Jisue
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.1
    • /
    • pp.83-108
    • /
    • 2019
  • This study investigated South Korean citizens' political communication and deliberation through Twitter during the 2014 General Election, focusing on influential opinion leaders' political information behaviors. Individual semi-structured interviews were administered with 13 opinion leaders using the multiple interview modes of email interviews, Skype interview and face to face interviews. Through the analytical lens of the theory of Information Worlds, the chosen social types and social norms of opinion leaders impacted their political information behaviors, including how they assessed, shared, exchanged, or avoided information, and, in turn, created boundaries between and around their information worlds that allowed for both conflict and synergy.

Design and Implementation of an Adaptive Hypermedia Learning System based on Leamer Behavioral Model (학습자 행동모델기반의 적응적 하이퍼미디어 학습 시스템 설계 및 구현)

  • Kim, Young-Kyun;Kim, Young-Ji;Mun, Hyeon-Jeong;Woo, Yang-Tae
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.5
    • /
    • pp.757-766
    • /
    • 2009
  • This study presents an adaptive hypermedia learning system which can provide individual learning environment using a learner behavioral model. This system proposes a LBML which can manage learners' learning behavioral information by tracking down such information real-time. The system consists of a collecting system of learning behavioral information and an adaptive learning support system. The collecting system of learning behavioral information uses Web 2.0 technologies and collects learners' learning behavioral information real-time based on a SCORM CMI data model. The collected information is stored as LBML instances of individual learners based on a LBML schema. With the adaptive learning support system, a rule-based learning supporting module and an interactive learning supporting module are developed by analysing LBML instances.

  • PDF

Unusual Behavior Detection of Korean Cows using Motion Vector and SVDD in Video Surveillance System (움직임 벡터와 SVDD를 이용한 영상 감시 시스템에서 한우의 특이 행동 탐지)

  • Oh, Seunggeun;Park, Daihee;Chang, Honghee;Chung, Yongwha
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.11
    • /
    • pp.795-800
    • /
    • 2013
  • Early detection of oestrus in Korean cows is one of the important issues in maximizing the economic benefit. Although various methods have been proposed, we still need to improve the performance of the oestrus detection system. In this paper, we propose a video surveillance system which can detect unusual behavior of multiple cows including the mounting activity. The unusual behavior detection is to detect the dangerous or abnormal situations of cows in video coming in real time from a surveillance camera promptly and correctly. The prototype system for unusual behavior detection gets an input video from a fixed location camera, and uses the motion vector to represent the motion information of cows in video, and finally selects a SVDD (one of the most well-known types of one-class SVM) as a detector by reinterpreting the unusual behavior into an one class decision problem from the practical points of view. The experimental results with the videos obtained from a farm located in Jinju illustrate the efficiency of the proposed method.

Meta-analysis of Information Security Policy Compliance Based on Theory of Planned Behavior (정보보안 정책준수에 대한 메타분석: 계획된 행동이론을 중심으로)

  • Kim, Jongki;Mou, Jian
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.169-176
    • /
    • 2020
  • With widespread use of information technologies the importance of information security has been heightened. Security policies which deal with fundamental direction of information security are critical elements of information security management. Numerous studies have been conducted on users' intention to comply security policies. They were based on various theoretical foundations and the theory of planned behavior(TPB) was the most frequently used. This research employed one of the quantitatively synthesizing meta-analytic techniques called Two-Stage Structural Equation Modeling to investigate factors influencing information security policy compliance behavior based on TPB. Analysis results indicated that all three factors of TPB were significantly influencing the behavioral intention. Moreover, the overall fit indices of structural model exhibited satisfactory level.