• Title/Summary/Keyword: Big data analysis system

Search Result 1,028, Processing Time 0.036 seconds

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Korean Word Sense Disambiguation using Dictionary and Corpus (사전과 말뭉치를 이용한 한국어 단어 중의성 해소)

  • Jeong, Hanjo;Park, Byeonghwa
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.1-13
    • /
    • 2015
  • As opinion mining in big data applications has been highlighted, a lot of research on unstructured data has made. Lots of social media on the Internet generate unstructured or semi-structured data every second and they are often made by natural or human languages we use in daily life. Many words in human languages have multiple meanings or senses. In this result, it is very difficult for computers to extract useful information from these datasets. Traditional web search engines are usually based on keyword search, resulting in incorrect search results which are far from users' intentions. Even though a lot of progress in enhancing the performance of search engines has made over the last years in order to provide users with appropriate results, there is still so much to improve it. Word sense disambiguation can play a very important role in dealing with natural language processing and is considered as one of the most difficult problems in this area. Major approaches to word sense disambiguation can be classified as knowledge-base, supervised corpus-based, and unsupervised corpus-based approaches. This paper presents a method which automatically generates a corpus for word sense disambiguation by taking advantage of examples in existing dictionaries and avoids expensive sense tagging processes. It experiments the effectiveness of the method based on Naïve Bayes Model, which is one of supervised learning algorithms, by using Korean standard unabridged dictionary and Sejong Corpus. Korean standard unabridged dictionary has approximately 57,000 sentences. Sejong Corpus has about 790,000 sentences tagged with part-of-speech and senses all together. For the experiment of this study, Korean standard unabridged dictionary and Sejong Corpus were experimented as a combination and separate entities using cross validation. Only nouns, target subjects in word sense disambiguation, were selected. 93,522 word senses among 265,655 nouns and 56,914 sentences from related proverbs and examples were additionally combined in the corpus. Sejong Corpus was easily merged with Korean standard unabridged dictionary because Sejong Corpus was tagged based on sense indices defined by Korean standard unabridged dictionary. Sense vectors were formed after the merged corpus was created. Terms used in creating sense vectors were added in the named entity dictionary of Korean morphological analyzer. By using the extended named entity dictionary, term vectors were extracted from the input sentences and then term vectors for the sentences were created. Given the extracted term vector and the sense vector model made during the pre-processing stage, the sense-tagged terms were determined by the vector space model based word sense disambiguation. In addition, this study shows the effectiveness of merged corpus from examples in Korean standard unabridged dictionary and Sejong Corpus. The experiment shows the better results in precision and recall are found with the merged corpus. This study suggests it can practically enhance the performance of internet search engines and help us to understand more accurate meaning of a sentence in natural language processing pertinent to search engines, opinion mining, and text mining. Naïve Bayes classifier used in this study represents a supervised learning algorithm and uses Bayes theorem. Naïve Bayes classifier has an assumption that all senses are independent. Even though the assumption of Naïve Bayes classifier is not realistic and ignores the correlation between attributes, Naïve Bayes classifier is widely used because of its simplicity and in practice it is known to be very effective in many applications such as text classification and medical diagnosis. However, further research need to be carried out to consider all possible combinations and/or partial combinations of all senses in a sentence. Also, the effectiveness of word sense disambiguation may be improved if rhetorical structures or morphological dependencies between words are analyzed through syntactic analysis.

A Study on the Satisfaction and Improvement Plan of Fraud Prevention Education about Technical and Vocational Education and Training (직업훈련 부정 예방교육 만족도 조사와 개선방안 연구)

  • Jeong, Sun Jeong;Lee, Eun Hye;Lee, Moon Su
    • Journal of vocational education research
    • /
    • v.37 no.5
    • /
    • pp.25-53
    • /
    • 2018
  • The purpose of this study is to find out the improvement plan through the satisfaction survey of the trainees involved in vocational training fraud preventive education. In order to do this, we conducted a satisfaction survey(4,263 persons) of 5,939 people who participated in the prevention education conducted by group education or e-learning in 2017. Finally we collected 4,237 effective responses data. Descriptive statistics and the regression analysis were conducted. The finding of the study were as follows. First, the education service quality(4.42), satisfaction level(4.44), understanding level(4.44) and help level(4.45) were significantly higher than those of participants in the preventive education 4 and above. Second, e-learning participants' perceived level of education service quality, satisfaction, comprehension, and help was higher in all variables than collective education's. Third, all of the sub-factors of preventive education service quality influenced satisfaction, understanding, and help in collective education and e-learning, respectively. In the collective education, the contents of education had the greatest influence, and in e-learning, the data composition had the greatest influence. Fourth, desirable education contents were cases of fraud training(70.7%), disposition regulations(47.9%), NCS course operation instructions(32.8%) and training management best practices(32.4%). Additional requirements also included the establishment of an in-depth course, the provision of anti-fraud education content for trainees, and screen switching and system stability that can be focused on e-learning. Therefore, this study suggests that first, it is necessary to activate e-learning for prevention education more, reflecting satisfaction of e-learning is higher than that of collective education. Second, it is necessary to diversify the content of preventive education and to provide it more abundantly, because it has the biggest influence in common with the satisfaction, understanding and help level of the preventive education. Third, education content next, the factors that have a relatively big influence on satisfaction are shown as delivery method and education place in the collective education. Therefore, it is necessary to prepare education place considering the assignment of instructor and convenience. Fourth, constructing data next, the factor that have a relatively great influence on understanding and help are found to be operator support, and more active operator support activities are required in e-learning. Fifth, it is required to delivery prevention activity for trainees participating in vocational training. Sixth, it is necessary to analyze the educational need to construct the contents of preventive education more systematically.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

Effects of firm strategies on customer acquisition of Software as a Service (SaaS) providers: A mediating and moderating role of SaaS technology maturity (SaaS 기업의 차별화 및 가격전략이 고객획득성과에 미치는 영향: SaaS 기술성숙도 수준의 매개효과 및 조절효과를 중심으로)

  • Chae, SeongWook;Park, Sungbum
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.151-171
    • /
    • 2014
  • Firms today have sought management effectiveness and efficiency utilizing information technologies (IT). Numerous firms are outsourcing specific information systems functions to cope with their short of information resources or IT experts, or to reduce their capital cost. Recently, Software-as-a-Service (SaaS) as a new type of information system has become one of the powerful outsourcing alternatives. SaaS is software deployed as a hosted and accessed over the internet. It is regarded as the idea of on-demand, pay-per-use, and utility computing and is now being applied to support the core competencies of clients in areas ranging from the individual productivity area to the vertical industry and e-commerce area. In this study, therefore, we seek to quantify the value that SaaS has on business performance by examining the relationships among firm strategies, SaaS technology maturity, and business performance of SaaS providers. We begin by drawing from prior literature on SaaS, technology maturity and firm strategy. SaaS technology maturity is classified into three different phases such as application service providing (ASP), Web-native application, and Web-service application. Firm strategies are manipulated by the low-cost strategy and differentiation strategy. Finally, we considered customer acquisition as a business performance. In this sense, specific objectives of this study are as follows. First, we examine the relationships between customer acquisition performance and both low-cost strategy and differentiation strategy of SaaS providers. Secondly, we investigate the mediating and moderating effects of SaaS technology maturity on those relationships. For this purpose, study collects data from the SaaS providers, and their line of applications registered in the database in CNK (Commerce net Korea) in Korea using a questionnaire method by the professional research institution. The unit of analysis in this study is the SBUs (strategic business unit) in the software provider. A total of 199 SBUs is used for analyzing and testing our hypotheses. With regards to the measurement of firm strategy, we take three measurement items for differentiation strategy such as the application uniqueness (referring an application aims to differentiate within just one or a small number of target industry), supply channel diversification (regarding whether SaaS vendor had diversified supply chain) as well as the number of specialized expertise and take two items for low cost strategy like subscription fee and initial set-up fee. We employ a hierarchical regression analysis technique for testing moderation effects of SaaS technology maturity and follow the Baron and Kenny's procedure for determining if firm strategies affect customer acquisition through technology maturity. Empirical results revealed that, firstly, when differentiation strategy is applied to attain business performance like customer acquisition, the effects of the strategy is moderated by the technology maturity level of SaaS providers. In other words, securing higher level of SaaS technology maturity is essential for higher business performance. For instance, given that firms implement application uniqueness or a distribution channel diversification as a differentiation strategy, they can acquire more customers when their level of SaaS technology maturity is higher rather than lower. Secondly, results indicate that pursuing differentiation strategy or low cost strategy effectively works for SaaS providers' obtaining customer, which means that continuously differentiating their service from others or making their service fee (subscription fee or initial set-up fee) lower are helpful for their business success in terms of acquiring their customers. Lastly, results show that the level of SaaS technology maturity mediates the relationships between low cost strategy and customer acquisition. That is, based on our research design, customers usually perceive the real value of the low subscription fee or initial set-up fee only through the SaaS service provide by vender and, in turn, this will affect their decision making whether subscribe or not.

The Comparison of the Ultra-Violet Radiation of Summer Outdoor Screened by the Landscaping Shade Facilities and Tree (조경용 차양시설과 수목에 의한 하절기 옥외공간의 자외선 차단율 비교)

  • Lee, Chun-Seok;Ryu, Nam-Hyong
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.41 no.6
    • /
    • pp.20-28
    • /
    • 2013
  • The purpose of this study was to compare the ultra-violet(UV) radiation under the landscaping shade facilities and tree with natural solar UV of the outdoor space at summer middays. The UVA+B and UVB were recorded every minute from the $20^{th}$ of June to the $26^{th}$ of September 2012 at a height of 1.1m above in the four different shading conditions, with fours same measuring system consisting of two couple of analog UVA+B sensor(220~370nm, Genicom's GUVA-T21GH) and UVB sensor(220~320nm, Genicom's GUVA-T21GH) and data acquisition systems(Comfile Tech.'s Moacon). Four different shading conditions were under an wooden shelter($W4.2m{\times}L4.2m{\times}H2.5m$), a polyester membrane structure ($W4.9m{\times}L4.9m{\times}H2.6m$), a Salix koreensis($H11{\times}B30$), and a brick-paved plot without any shading material. Based on the 648 records of 17 sunny days, the time serial difference of natural solar UVA+B and UVB for midday periods were analysed and compared, and statistical analysis about the difference between the four shading conditions was done based on the 2,052 records of daytime period from 10 A.M. to 4 P.M.. The major findings were as follows; 1. The average UVA+B under the wooden shelter, the membrane and the tree were $39{\mu}W/cm^2$(3.4%), $74{\mu}W/cm^2$(6.4%), $87{\mu}W/cm^2$(7.6%) respectively, while the solar UVA+B was $1.148{\mu}W/cm^2$. Which means those facilities and tree screened at least 93% of solar UV+B. 2. The average UVB under the wooden shelter, the membrane and the tree were $12{\mu}W/cm^2$(5.8%), $26{\mu}W/cm^2$(13%), $17{\mu}W/cm^2$(8.2%) respectively, while the solar UVB was $207{\mu}W/cm^2$. The membrane showed the highest level and the wooden shelter lowest. 3. According to the results of time serial analysis, the difference between the three shaded conditions around noon was very small, but the differences of early morning and late afternoon were apparently big. Which seems caused by the matter of the formal and structural characteristics of the shading facilities and tree, not by the shading materials itself. In summary, the performance of the four landscaping shade facilities and tree were very good at screening the solar UV at outdoor of summer middays, but poor at screening the lateral UV during early morning and late afternoon. Therefore, it can be apparently said that the more delicate design of shading facilities and big tree or forest to block the additional lateral UV, the more effective in conditioning the outdoor space reducing the useless or even harmful radiation for human activities.

Real Option Analysis to Value Government Risk Share Liability in BTO-a Projects (손익공유형 민간투자사업의 투자위험분담 가치 산정)

  • KU, Sukmo;LEE, Sunghoon;LEE, Seungjae
    • Journal of Korean Society of Transportation
    • /
    • v.35 no.4
    • /
    • pp.360-373
    • /
    • 2017
  • The BTO-a projects is the types, which has a demand risk among the type of PPP projects in Korea. When demand risk is realized, private investor encounters financial difficulties due to lower revenue than its expectation and the government may also have a problem in stable infrastructure operation. In this regards, the government has applied various risk sharing policies in response to demand risk. However, the amount of government's risk sharing is the government's contingent liabilities as a result of demand uncertainty, and it fails to be quantified by the conventional NPV method of expressing in the text of the concession agreement. The purpose of this study is to estimate the value of investment risk sharing by the government considering the demand risk in the profit sharing system (BTO-a) introduced in 2015 as one of the demand risk sharing policy. The investment risk sharing will take the form of options in finance. Private investors have the right to claim subsidies from the government when their revenue declines, while the government has the obligation to pay subsidies under certain conditions. In this study, we have established a methodology for estimating the value of investment risk sharing by using the Black - Scholes option pricing model and examined the appropriateness of the results through case studies. As a result of the analysis, the value of investment risk sharing is estimated to be 12 billion won, which is about 4% of the investment cost of the private investment. In other words, it can be seen that the government will invest 12 billion won in financial support by sharing the investment risk. The option value when assuming the traffic volume risk as a random variable from the case studies is derived as an average of 12.2 billion won and a standard deviation of 3.67 billion won. As a result of the cumulative distribution, the option value of the 90% probability interval will be determined within the range of 6.9 to 18.8 billion won. The method proposed in this study is expected to help government and private investors understand the better risk analysis and economic value of better for investment risk sharing under the uncertainty of future demand.

A study on the employment preparation cost and attitude of college student for Job-seeking (국내 대학생의 취업태도 및 취업준비 비용에 관한 연구)

  • Chung, Bhum-Suk;Jeong, Hwa-Min
    • Management & Information Systems Review
    • /
    • v.33 no.4
    • /
    • pp.1-19
    • /
    • 2014
  • This Study focuses on the university students' job attitude and cost of employment preparation. Nowadays, many university and college students spend a big money improving their employment preparation such as studying on foreign language, getting various kinds of certificates and tooth correction, clothing etc. for employment interview. This study investigated the cost of employment preparation and Job attitude of the 484 students of universities and colleges, the analysis of the collected data was conducted with SPSS 12.0 program by using frequency analysis, factor analysis, reliability assessment, correlation test, t-test, one way ANOVA. The university students paid more costs of employment preparation such as a language training abroad, a private training, and clothing than the college students. Also, Allied social science students paid more costs of the language training abroad, and clothing than allied computer science and allied design students. The female students paid more money than male students for tooth correction. The costs of language training abroad, private training and clothing are affected the students' socioeconomic background of a home. Regarding the job attitude of students, the university students are feeling more positive than the college students of the employment efficacy and cognition of the education environment. As result, the differences in the cost of employment preparation by the university type, faculty major course, their sex, and socioeconomic background of a home. The student's employment-efficacy and cognition of the education environment are also differences between the university and the college students. So, to improve the job attitude, developing their ability for employment preparation, educational programs should be arranged in school and continuous researches are needed.

  • PDF

The Operation of Home Economics Education Course in Graduate School of Education and the Graduate Students' Perception (서울소재 교육대학원 가정교육전공 교육과정에 대한 운영실태와 교육대학원생의 인식)

  • Lee, Seon-Jung;Shin, Hye-Won
    • Journal of Korean Home Economics Education Association
    • /
    • v.20 no.4
    • /
    • pp.173-186
    • /
    • 2008
  • This study aimed to examine the operation of the Home Economics education courses in the graduate schools of education, and to find out how graduate students perceive them. Data were collected with the use of handbooks issued by 11 graduate schools of education located in Seoul, and through telephone conversations with the administrative staff. To determine how graduate students majoring in Home Economics perceive their Home Economics courses, a survey was conducted among the graduate students in 10 graduate schools of education, and a total of 131 accomplished questionnaires were used for data analysis. The results of the study are as follows. First, all 11 graduate schools aimed to retrain their teachers, enhance their professionalism, and produce home economics education experts. The Home Economics Education courses come in two strands; a teacher's course and a major course. Most of the schools require a total of 30 credits. All Schools lack professors. Only 3 graduate schools have a home Economics Department in the College of Education. All graduate schools are offering a teacher's course based on a teacher's certification system. In a major course, Home Economics education has the largest number of subjects, with Clothing and Textiles and Food and Nutrition being given greater emphasis, and Consumer Economics, Home Economics Management, Child Care, and Family and Housing Studies being given less emphasis. Second, they mostly regard the graduate school of education as producer of experts, followed by producers of teachers and teacher re-trainers. Those who were majoring in Home Economics Education in college, and the teachers, are more interested in teacher re-training, while the non-teachers and those who were not majoring in Home Economics Education are more interested in producing teachers. They are less satisfied with the operation of the graduate school of education. But they are generally satisfied with the Home Economics Education course. Graduate students registered the lowest satisfaction with a major course, especially experimental subjects. For a teacher's course, the graduate students who are not teachers exhibited higher satisfaction, whereas the teachers showed lower satisfaction. But teachers registered more satisfaction with the practical use of major subjects in the educational field, thinking that their major was a big help in their work at a school. As for what has to be improved with regard to the Home Economics Education course, many cited the necessity of securing a good faculty and expanding the major subjects.

  • PDF

User Behavior and Improvement for Kumgang Pine Eco-Forest in Uljin (울진금강송 생태숲의 이용자 행태분석과 개선방안)

  • Oh, Nam-Hyun
    • Korean Journal of Environment and Ecology
    • /
    • v.22 no.3
    • /
    • pp.249-259
    • /
    • 2008
  • The purpose of this study was to analyze the users' behaviors and to suggest development strategies in Uljin Kumgang pine tree(Pinus densiflora for. erecta) eco-forest(UKPEF), which is located in Kyeongbuk. The data were collected by interviewing 122 visitors to september 3 from august 29, 2007 with a constructed questionnaire. The results of the analysis are as follows. 1. The major visitors of UKPEF are male and the age between 20 to 30, the residents of the Uljin county with relatively high academic background. 2. The motive of visiting UKPEF is mainly by the beauty and taste of Kumgang pine tree and the condition of the forest. The visitors are mainly composed of family, not big group. 3. The visitors of UKPEF have obtained information about the Kumgang fine tree forest mainly from friends, not from the internet or travel agency. 4. The visitors of UKPEF pointed out lack of convenient facilities such as toilets and water-supply facilities. However, visitors are satisfied by the condition of the forest. 5. The visitors of UKPEF set a high value on Kumgang fine tree, So, more active marketing strategy about Uljin Kumgang pine tree has to be established. 6. The visitors of UKPEF are more satisfied by the Uljin Kumgang pine tree forest than expected. The development strategies of UKPEF are suggest as follows. (1) Auto tram system has to be set up and new trail should be constructed to attract more visitors and people of other regions. (2) To attract group tourists, new program should be developed. (3) Advertisement through internet or travel agency has to be developed. (4) Government(local) should make a plan to register the forest as World natural heritage. (5) Monitoring and evaluation system has to be developed to satisfy tourists. In conclusion, the efforts of taking care of and preserving the UKPEF should be made at the national level. I hope that more Koreans can have chance to feel and experience the value and excellence ofthe Uljin Kumgang pine tree(Pinus densiflora for. erecta)