KSII Transactions on Internet and Information Systems (TIIS)
/
v.11
no.11
/
pp.5537-5555
/
2017
Having the characteristics of unlinkability, anonymity, and unforgeability, blind signatures are widely used for privacy-related applications such as electronic cash, electronic voting and electronic auction systems where to maintain the anonymity of the participants. Among these applications, the blinded message is needed for a certain purpose by which users delegate signing operation and communicate with each other in a trusted manner. This application leads to the need of proxy blind signature schemes. Proxy blind signature is an important type of cryptographic primitive to realize the properties of both blind signature and proxy signature. Over the past years, many proxy blind signature algorithms have been adopted to fulfill such task based on the discrete logarithm problem (DLP) and the elliptic curve discrete log problem (ECDLP), and most of the existing studies mainly aim to provide effective models to satisfy the security requirements concerning a single blinded message. Unlike many previous works, the proposed scheme applies the signcryption paradigm to the proxy blind signature technology for handling multiple blinded messages at a time based on elliptic curve cryptography (ECC). This innovative method thus has a higher level of security to achieve the security goals of both blind signature and proxy signature. Moreover, the evaluation results show that this proposed protocol is more efficient, consuming low communication overhead while increasing the volume of digital messages compared to the performance from other solutions. Due to these features, this design is able to be implemented in small low-power intelligent devices and very suitable and easily adoptable for e-system applications in pervasive mobile computing environment.
Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
/
v.8
no.10
/
pp.1-9
/
2018
The purpose of this exploratory study is to identify the mobile phone applications (apps) used by foreign tourists visiting South Korea through a pilot study using focus groups and individual interviews. Concentrating on tourist mobile app use in a smart tourism environment and categorized through a taxonomy of mobile applications lays the framework and determines the factors boosting tourism smartphone app trends by foreign tourists visiting South Korea. Researchers collected data through ethnographic methods and analyzed it through qualitative research to uncover major themes within the smart tourism app use phenomenon. The researchers coded, counted, analyzed, and then divided the findings gleaned from a pilot study and interviews into a taxonomy of seven logical smartphone app categories. The labeling and coding of all the data accounting for similarities and differences can be recognized and are logically discussed in the implications of the apps used by tourists to assist tourist destinations. More specifically these findings will assist smart tourism destinations by better understanding foreign tourist smartphone app use behavior. Tourists visiting South Korea interviewed in this study exhibited significant mastery of Internet of Things (IoT) technologies, craved free WiFi access, and utilized smartphone apps for all facets of their travel. Findings show major concentrations of app use in bookings of accommodations, tourist attractions, online shopping, navigation, wayfinding, augmented reality, information searching, language translation, gaming, and online dating while traveling in South Korea.
Journal of Information Technology Applications and Management
/
v.21
no.3
/
pp.119-133
/
2014
Prior to the 2000s, internal control had not been among the high priority issues in the management's agenda. Since then, however, it has become one of the hottest issues, and has received a significant attention as the means of improving the transparency, sustainability, and competitiveness of a company. The objectives of this paper are to examine if there has been any noticeable changes in the level of internal controls of Korean companies before and after the 2010, and to analyze the underlying drivers and issues thereto. Accounting manipulation and moral hazard were among the factors to cause the Korean financial crisis in 1997 and 2008. Since then, the capital market has had a strong pressure on Korean companies to enhance the transparency of management and accounting while the government has made the laws, requirements, and recommendations to alleviate the moral hazard problems of management and enhance the accounting transparency. Both market and government have driven companies to put more priority on the reliability of financial reporting and the compliance of applicable laws and regulations. Thereby, the market and governmental forces has led companies to enhance the level of internal controls which contribute to the reliability of financial reporting and the compliance The pressure on companies to enhance the level of internal controls may be different across industries. The capital market and government experiencing the severe financial crisis in 1997 and 2008 put even more pressure on financial companies such as banks to upgrade the reliability of financial reporting and the compliance of regulations to the global level than on non-financial companies. A survey is performed on the changes in the level of internal controls of 54 major companies consisting of 10 financial and 44 non-financial companies in Korea. The survey results show that the average level of internal controls of Korean companies has noticeably improved and that the change in the level of control environment factor is higher than that of IT control factor. The analysis on the industry differences shows that financial companies increased the level of control environment factor more than non-financial companies did while non-financial companies upgraded the level of IT control factor more than financial companies did relatively. Among internal control categories, the most improved area since the economic crisis is "Risk Assessment." The global best practices for risk management have been developed primarily in the financial industry and then spread to other industries. The general level of control practices of Korean companies has been improving significantly, but still appears below the global advanced practices.
Lung cancer remains a major cause of morbidity and mortality worldwide, accounting for more deaths than any other cause. All the clinical practice guidelines recommended against routine screening for lung cancer have cited lack of robust evidence, at least until a few years back. However, the potential to screen lung cancers has received renewed interest due to superior performance of low dose CT (LD-CT) in detecting early stage cancers. The incremental costs and risks involved due to the invasive procedures in the screened population due to a high false positivity rate questions the use of LD-CT scan as a reliable community based screening tool. There is therefore an urgent need to find a less invasive and a more reliable biomarker that is crucial to increase the probability of early lung cancer detection. This can truly make a difference in lung cancer survival and at the same time be more cost and resource utilization effective. Sampling blood serum being minimally invasive, low risk and providing an easy to obtain biofluid, needs to be explored for potential biomarkers. This review discusses the use of circulatory miRNAs that have been able to discriminate lung cancer patients from disease free controls. Several studies conducted recently suggest that circulating miRNAs may have promising future applications for screening and early detection of lung cancer.
KSII Transactions on Internet and Information Systems (TIIS)
/
v.8
no.2
/
pp.691-708
/
2014
This paper formalizes a special type of social networking knowledge, which is called "workflow performer-role affiliation networking knowledge." A workflow model specifies execution sequences of the associated activities and their affiliated relationships with roles, performers, invoked-applications, and relevant data. In Particular, these affiliated relationships exhibit a stream of organizational work-sharing knowledge and utilize business process intelligence to explore resources allotting and planning knowledge concealed in the corresponding workflow model. In this paper, we particularly focus on the performer-role affiliation relationships and their implications as organizational and business process intelligence in workflow-driven organizations. We elaborate a series of theoretical formalisms and practical implementation for modeling, discovering, and visualizing workflow performer-role affiliation networking knowledge, and practical details as workflow performer-role affiliation knowledge representation, discovery, and visualization techniques. These theoretical concepts and practical algorithms are based upon information control net methodology for formally describing workflow models, and the affiliated knowledge eventually represents the various degrees of involvements and participations between a group of performers and a group of roles in a corresponding workflow model. Finally, we summarily describe the implications of the proposed affiliation networking knowledge as business process intelligence, and how worthwhile it is in discovering and visualizing the knowledge in workflow-driven organizations and enterprises that produce massively parallel interactions and large-scaled operational data collections through deploying and enacting massively parallel and large-scale workflow models.
Journal of Information Technology Applications and Management
/
v.14
no.1
/
pp.179-202
/
2007
This paper presents and tests a conceptual model of Technology Acceptance Model (TAM) that explains perceived usefulness, perceived ease of use, organizational commitment and turnover intention in terms of psychological commitments in mandatory environments. The model focuses on the psychological commitments (Kelman's internalization, Identification, compliance) as the primary predictors of perceived usefulness, perceived ease of use and organizational commitment. We discuss our current understanding of technology acceptance as well as the notion of mandated use. The results are as fellows that organizational commitment is negatively related to turnover intention : perceived usefulness is positively related to organizational commitment : psychological commitments are positively related to organizational commitment, perceived usefulness and perceived ease of use : perceived ease of use is positively related to perceived usefulness in mandatory environments. Through this research, psychological commitments are the strong determinants of technology acceptance in mandatory environments. These findings advance theory and contribution to the foundation for future research aimed at Improving our understanding of user adoption behavior in mandatory environments.
Journal of Information Technology Applications and Management
/
v.18
no.2
/
pp.91-108
/
2011
Enormous losses of shareholders and consumers caused by the risks threatening today's business (e.g., accounting fraud and inside trading) have ignited the necessity of international regulations on corporate ethics and internal control, such as Basel II and SOX. Responding to these regulations, companies are establishing governance system, applying it consistently to the core competency of the company, and increasing the scope of the governance system. Recently occurred security related incidents require companies to take more strict accountability over information security. One of the results includes strengthening of legislation and regulations. For these reasons, introduction of information security governance is needed. Information security governance governs the general information security activities of the company (establishment of information security management system, implementation of information security solutions) in the corporate level. Recognizing that the information security is not restricted to IT domain, but is the issue of overall business, this study develops information security governance framework based on the existing frameworks and systems of IT governance. The information security governance framework proposed in the study include concept, objective, and principle schemes which will help clearly understand the concepts of the information security governance, and execution scheme which will help implement proper organization, process and tools needed for the execution of information security governance.
Purpose: The purpose of this study is to investigate the tail behavior of the life distribution which exhibits an increasing failure rate or other positive aging effects after a certain time point. Methods: We characterize the tail behavior of the life distribution with regard to certain reliability measures such as failure rate, mean residual life and reliability function and derive several stochastic properties regarding such life distributions. Also, utilizing an L-statistic and its asymptotic normality, we propose new nonparametric testing procedures which verify if the life distribution has an increasing tail failure rate. Results: We propose the IFR-Tail (Increasing Failure Rate in Tail), DMRL-Tail (Decreasing Mean Residual Life in Tail) and NBU-Tail (New Better than Used in Tail) classes, all of which represent the tail behavior of the life distribution. And we discuss some stochastic properties of these proposed classes. Also, we develop a new nonparametric test procedure for detecting the IFR-Tail class and discuss its relative efficiency to explore the power of the test. Conclusion: The results of our research could be utilized in the study of wide range of applications including the maintenance and warranty policy of the second-hand system.
Lee, Sang Mee;Karrison, Theodore;Nocon, Robert S.;Huang, Elbert
Communications for Statistical Applications and Methods
/
v.25
no.2
/
pp.173-184
/
2018
In medical or public health research, it is common to encounter clustered or longitudinal count data that exhibit excess zeros. For example, health care utilization data often have a multi-modal distribution with excess zeroes as well as a multilevel structure where patients are nested within physicians and hospitals. To analyze this type of data, zero-inflated count models with mixed effects have been developed where a count response variable is assumed to be distributed as a mixture of a Poisson or negative binomial and a distribution with a point mass of zeros that include random effects. However, no study has considered a situation where data are also censored due to the finite nature of the observation period or follow-up. In this paper, we present a weighted version of zero-inflated Poisson model with random effects accounting for variable individual follow-up times. We suggested two different types of weight function. The performance of the proposed model is evaluated and compared to a standard zero-inflated mixed model through simulation studies. This approach is then applied to Medicaid data analysis.
Journal of Information Technology Applications and Management
/
v.18
no.3
/
pp.1-30
/
2011
InnovVizwas designed and developed anew as avisualization and simulationtool to present innovation and strategy information. The InnovViz system employs two key types of technology, namely mixed reality (MR) and neural network (NN). An experiment was conducted to examine the usability, acceptance and possible adoption of this new system. Participants comprised 4 experts from 4 top performing entrepreneurial firms and 161 master degree students from 2 leading universities. The study used a modified UTAUT model and a cognition and perception model. The results revealed that when the InnovViz was introduced, the key drivers to adoption are Facilitating Conditions (FC) and Voluntary to Use (VOL). Adequate knowledge and sufficient resources were found to strongly affect FC construct. The expert's rating of a firm's innovation and performance was more congruent with senior students with a technology-background than with a finance and accounting-background. InnovViz was seen as providing complex information with an ease of use and usefulness for showing data and assessment. Among the three types of visuals depicted by InnovViz, experts rated their usefulness in descending order as follows: Cube, Tetrahedron and Saturn. Finally, experts found backward simulation to be slightly more useful for assessment than forward simulation.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.