• Title/Summary/Keyword: Consensus of Information

Search Result 543, Processing Time 0.033 seconds

Analysis of Success Factors of OTT Original Contents Through BigData, Netflix's 'Squid Game Season 2' Proposal (빅데이터를 통한 OTT 오리지널 콘텐츠의 성공요인 분석, 넷플릭스의 '오징어게임 시즌2' 제언)

  • Ahn, Sunghun;Jung, JaeWoo;Oh, Sejong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.1
    • /
    • pp.55-64
    • /
    • 2022
  • This study analyzes the success factors of OTT original content through big data, and intends to suggest scenarios, casting, fun, and moving elements when producing the next work. In addition, I would like to offer suggestions for the success of 'Squid Game Season 2'. The success factor of 'Squid Game' through big data is first, it is a simple psychological experimental game. Second, it is a retro strategy. Third, modern visual beauty and color. Fourth, it is simple aesthetics. Fifth, it is the platform of OTT Netflix. Sixth, Netflix's video recommendation algorithm. Seventh, it induced Binge-Watch. Lastly, it can be said that the consensus was high as it was related to the time to think about 'death' and 'money' in a pandemic situation. The suggestions for 'Squid Game Season 2' are as follows. First, it is a fusion of famous traditional games of each country. Second, it is an AI-based planned MD product production and sales strategy. Third, it is casting based on artificial intelligence big data. Fourth, secondary copyright and copyright sales strategy. The limitations of this study were analyzed only through external data. Data inside the Netflix platform was not utilized. In this study, if AI big data is used not only in the OTT field but also in entertainment and film companies, it will be possible to discover better business models and generate stable profits.

An Analysis of the Public Librarians' Self Images using Semantic Differential Method (의미 변별법을 활용한 공공도서관 사서의 자아상 분석)

  • Song, Gi-Ho
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.50 no.3
    • /
    • pp.53-69
    • /
    • 2016
  • The purpose of this study is to measure self images of public librarians who should increasingly take charge of services for children and young people through the semantic differential method and analyze its' general characteristics. According to the results of analysis public librarians have been satisfied with their works and believed that they are kind, fair and gentle. One the other hand, they have had negative self images such as no influence, neglect, poor and stuffiness. Therefore, the result show that public librarians consider their ability, quality and activity as positive images, but they have felt lack of the social consensus and affirmative evaluation of their role. So, we can see building a good physical environment and running great programs to create access of children and young people to the public libraries, demonstrating leadership among senior librarians are so important in order to beat the stereotype and improve their positive self images of their evaluation and role. It is also necessary to promote the new value and role of public libraries and librarianship and to enable retraining for cultivating their qualities as a teacher.

Research on Idustrial Convergence Evaluation Model Using KSIC-IPC: Focusing on the automotive sector (KSIC-IPC를 이용한 산업융합 평가모형 연구: 자동차 분야를 중심으로)

  • Lee, Haeng Byoung;Han, Kyu-Bo;Lee, Jung Hoon
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.3
    • /
    • pp.227-237
    • /
    • 2022
  • With the growing interest in convergence, there have been various attempts to measure convergence, but the definition of convergence is ambiguous and consensus on appropriate indicators has not been reached, so measurement of convergence is still at a rudimentary stage. In this study, using the KSIC-IPC linkage table developed by the Korean Intellectual Property Office to analyze the correlation and impact of patents, industry, economy, and population, we propose a new evaluation model that can evaluate industry convergence from patent data. In addition, it was verified whether the industry convergence derived from this properly reflects the corporate convergence characteristics. As a result of classifying the convergence of 39,740 patents owned by global major automobile companies, and evaluating the degree of convergence of each company, it was confirmed that the industry convergence derived using the KSIC-IPC linkage table better reflects the corporate convergence characteristics than the technology convergence classified by IPC co-classification. Therefore, the industry convergence data of automotive sector derived from the new industry convergence evaluation model using the KSIC-IPC linkage table is expected to be widely used for future convergence research.

An Exploratory Study on Key Factors of SOA Success (SOA 성공의 영향요인에 대한 탐색적 연구)

  • Cho, Nam-Jae;Kim, Ji-Yun;Yun, Young-Don
    • Information Systems Review
    • /
    • v.12 no.2
    • /
    • pp.105-119
    • /
    • 2010
  • SOA has become the focus of attention as it is perceived as a concept toward integrative service which helps companies respond quickly to the changes in market needs. This study is aimed to find out success factors for building SOA. We carried out two case studies on companies that adopted SOA successfully in Korea and conducted a survey to collect opinions from experts and experienced managers whose job is related to SOA. The critical successful factors found in this study include: 1) establishment of the SOA taskforce based on CIO's strong support, 2) formation of the corporate-wide consensus and the adoption of standards, 3) active user participation in defining services and obliterating duplication, 4) accomplishment of flexibility in services and business agility based on integrated infrastructure, and 5) securing project budget and consistent support by way of using measurement index for SOA investment effects.

A Study on the Effectiveness of Using Keywords in Book Reviews for Customized Book Recommendation for Each Personality Type (성격유형별 선호도서 추천을 위한 서평 키워드 활용의 유효성 연구)

  • Cha, Yeon-Hee;Choi, Sung-Pil
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.3
    • /
    • pp.343-372
    • /
    • 2021
  • The purpose of this study is to select keywords that can recommend books by personality type, and to test whether the chosen keywords can be actually used in the categorization and customized recommendation of books for each personality type. To achieve the research goal, this study chose books that match the level of fifth and sixth grade elementary school students and first grade middle school students and commissioned an expert group to categorize the books into groups that are preferred by each personality type. As a result of the classification, half of the books in which more than five experts agreed showed high consensus. In addition, the results of classifying books by personality type with keywords extracted by the automatic word extraction system by collecting the book review data of the selected books were similar to the results of the final judgement by the expert group, except for a few books. In conclusion, this study proved that it is possible to classify and recommend books that are likely to be preferred by different personality types using review keywords.

Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management

  • S. Poorani;R. Anitha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3182-3203
    • /
    • 2023
  • With the growing adoption of cloud-based technologies, maintaining the privacy and security of cloud data has become a pressing issue. Privacy-preserving encryption schemes are a promising approach for achieving cloud data security, but they require careful design and implementation to be effective. The integrated approach to cloud data security that we suggest in this work uses CogniGate: the orchestrated permissions protocol, index trees, blockchain key management, and unique Opacus encryption. Opacus encryption is a novel homomorphic encryption scheme that enables computation on encrypted data, making it a powerful tool for cloud data security. CogniGate Protocol enables more flexibility and control over access to cloud data by allowing for fine-grained limitations on access depending on user parameters. Index trees provide an efficient data structure for storing and retrieving encrypted data, while blockchain key management ensures the secure and decentralized storage of encryption keys. Performance evaluation focuses on key aspects, including computation cost for the data owner, computation cost for data sharers, the average time cost of index construction, query consumption for data providers, and time cost in key generation. The results highlight that the integrated approach safeguards cloud data while preserving privacy, maintaining usability, and demonstrating high performance. In addition, we explore the role of differential privacy in our integrated approach, showing how it can be used to further enhance privacy protection without compromising performance. We also discuss the key management challenges associated with our approach and propose a novel blockchain-based key management system that leverages smart contracts and consensus mechanisms to ensure the secure and decentralized storage of encryption keys.

A Glimpse into Brazil Conference (2014 브라질 회의로 가는 길)

  • Chun, Eung Hwi
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.4
    • /
    • pp.63-76
    • /
    • 2013
  • This short report introduces the general background why Brazil conference is being prepared and what topics would be undertaken and what goals are being taken into account. It overviews what differences from traditional telecommunication governance, internet governance has had in its historical development and how such differences had been formed from its technological differences and the regulatory policy shift from common carrier regulation to privatization. Moreover, the fact that open, voluntary, bottom-up, diverse stakeholder's participation had evolved throughout the historical development of the internet, had established the present multistakeholder governance model from technological standardization to addressing scheme policies. ICANN, which has governed internet addressing schemes since the earlier 2000s, had developed address policies including IANA function from Jon Postel and technical community's legacy management system into contract based formation between ICANN and gTLD, ccTLD registries. And it made dispute resolution policies responding to trademark disputes and resolved gTLD monopoly issue by introducing new TLD generation and the separation of registry and registar. However, there had been challenges on the legitimacy of ICANN due to its dependency on the Federal Government of the U.S. particularly in its oversight role over ICANN and IANA contract. WSIS raised up internet governance issues including addressing governance, and set up IGF as a discussion platform for multistakeholders to discuss and share all views on other internet related public policies. IGF's loose and non-binding discussion once frustrated governments and other stakeholders, but more focused discussion and visible outcomes have consolidated its unique role for internet governance discourses. Particularly, IGF addressed many emerging internet related issues like cybersecurity, privacy, net neuratlity, development related issues. WTPF of 2013, after WCIT debate on whether traditional telecommunication regulation could be applied to internet infrastructure, suggested other governance issues such as the transition to ipv6, IXP coordination etc. How to make sure the legitimacy of internet addressing governance and how and where other internet related public policies could be undertaken are fundamental tasks for internet governance. Brazil conference, which has been motivated by the breakdown of trust in internet governance from NSA mass surveillance revealed by Snowden, faces these questions and try to make consensus on principles, institutions and roadmap for internet governance in multistakeholder participation way.

  • PDF

A Study of News Consonance on the Intermedia and Intramedia Agenda: Focused on the 2000 presidential campaign news coverage (매체간(Intermedia)과 매체내(Intramedia) 의제분석을 통한 뉴스획일화 연구: 2000년 미국 대통령 선거운동에 관한 뉴스보도를 중심으로)

  • Ku, Gyo-Tae
    • Korean journal of communication and information
    • /
    • v.21
    • /
    • pp.7-34
    • /
    • 2003
  • The present study was designed to study the media consonance of campaign news coverage by comparing the issue salience provided by each medium. To explore the issue of consonance, this study examined the relationship of campaign agenda at intermedia and intramedia level. The data analysis revealed that there was general consensus in setting the campaign agenda at the intramedia and the intermedia level. On the other hand, the research focus indicated there was media difference in reporting the campaign agenda over time. In the perspective of agenda-setting function, the exposure to news media with greater uniformity might result in greater agenda-setting effects, since the media makes the issues salient by giving more media attention. After all, the uniformity of issue salience among news media might influence "what issues to think about," resulting in limiting the range of democratic discussion.

  • PDF

Core Competence Evaluation Model of Play Worker Based on Delphi Technique (델파이 조사를 통한 놀이 전문가 핵심역량 분석)

  • Park, Hye-Jin;Kim, Yong-Young
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.2
    • /
    • pp.100-107
    • /
    • 2019
  • The purpose of this study is to develop an evaluation model to measure the core competences of actual play workers by exploring what competences are necessary for them to provide quality play. Based on literature review, we selected five core competences : knowledge of play, program development, understanding play culture, creativity, and information sharing & applying. In order to achieve the research purpose end, a two-round Delphi survey was conducted on 10 play and education experts. The findings drew scholarly consensus on the competences of play workers to have and proposed basic data by developing competences evaluation model to measure them. Each of the key competences has three sub-conpetences, each of which included two behavior elements. Furthermore, this study presented future research directions so that play can be voluntarily planned and supported in a social and cultural context.

A study on the application of legal design methodology for commercialization of security tokens

  • Sangyub Han;Hokyoung Ryu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.7
    • /
    • pp.117-128
    • /
    • 2024
  • In this paper, we propose a process for deriving priority tasks using the legal design technique in a situation where there is high uncertainty in the market and legal system regarding the commercialization of security tokens based on blockchain and distributed ledger technology. To issue and distribute securities tokens, we conducted a legal design workshop with participants who applied for innovative financial services (financial regulatory sandbox). During the workshop, participants harmonized their interests and deliberated on readiness, considering both legal and technical factors. The aim was to ascertain the feasibility of identifying prioritized objectives for future endeavors. The legal design technique facilitates consensus-building among stakeholders in an uncertain environment by confirming and adjusting differing perspectives and disagreements based on mutual understanding. The key stages include the empathetic process called "Family Therapy," the "N whys" for problem definition, and the speculative scenario design for problem-solving. This approach distinguishes itself from user-centered design thinking. Given the diverse stakeholders involved, effective facilitation by the facilitator is crucial during the legal design workshop preparation and execution.