• Title/Summary/Keyword: Contents Management

Search Result 6,770, Processing Time 0.031 seconds

Analysis of Keywords in national river occupancy permits by region using text mining and network theory (텍스트 마이닝과 네트워크 이론을 활용한 권역별 국가하천 점용허가 키워드 분석)

  • Seong Yun Jeong
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.185-197
    • /
    • 2023
  • This study was conducted using text mining and network theory to extract useful information for application for occupancy and performance of permit tasks contained in the permit contents from the permit register, which is used only for the simple purpose of recording occupancy permit information. Based on text mining, we analyzed and compared the frequency of vocabulary occurrence and topic modeling in five regions, including Seoul, Gyeonggi, Gyeongsang, Jeolla, Chungcheong, and Gangwon, as well as normalization processes such as stopword removal and morpheme analysis. By applying four types of centrality algorithms, including stage, proximity, mediation, and eigenvector, which are widely used in network theory, we looked at keywords that are in a central position or act as an intermediary in the network. Through a comprehensive analysis of vocabulary appearance frequency, topic modeling, and network centrality, it was found that the 'installation' keyword was the most influential in all regions. This is believed to be the result of the Ministry of Environment's permit management office issuing many permits for constructing facilities or installing structures. In addition, it was found that keywords related to road facilities, flood control facilities, underground facilities, power/communication facilities, sports/park facilities, etc. were at a central position or played a role as an intermediary in topic modeling and networks. Most of the keywords appeared to have a Zipf's law statistical distribution with low frequency of occurrence and low distribution ratio.

Information Security Job Skills Requirements: Text-mining to Compare Job Posting and NCS (정보보호 직무 수행을 위해 필요한 지식 및 기술: 텍스트 마이닝을 이용한 구인광고와 NCS의 비교)

  • Hyo-Jung Jun;Byeong-Jo Park;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.3
    • /
    • pp.179-197
    • /
    • 2023
  • As a sufficient workforce supports the industry's growth, workforce training has also been carried out as part of the industry promotion policy. However, the market still has a shortage of skilled mid-level workers. The information security disclosure requires organizations to secure personnel responsible for information security work. Still, the division between information technology work and job areas is unclear, and the pay is not high for responsibility. This paper compares job keywords in advertisements for the information security workforce for 2014, 2019, and 2022. There is no difference in the keywords describing the job duties of information security personnel in the three years, such as implementation, operation, technical support, network, and security solution. To identify the actual needs of companies, we also analyzed and compared the contents of job advertisements posted on online recruitment sites with information security sector knowledge and skills defined by the National Competence Standards used for comprehensive vocational training. It was found that technical skills such as technology development, network, and operating system are preferred in the actual workplace. In contrast, managerial skills such as the legal system and certification systems are prioritized in vocational training.

Evaluation of Salt Tolerance of Three Foliage Plant as affected by Salinity Concentration in Indoor Ornamental Hydroculture (실내 관상용 물재배에서 염분농도에 따른 3가지 관엽식물의 내염성 평가)

  • Jin Hee Ju;Sun Young Park;Yong Han Yoon
    • Journal of Environmental Science International
    • /
    • v.33 no.4
    • /
    • pp.257-268
    • /
    • 2024
  • This study investigated the growth characteristics of Euonymus japonicus, Hedera helix, and Peperomia puteolata treated with different calcium chloride (CaCl2) concentrations to evaluate salt tolerance limits in hydroculture cultivation. Six concentrations of CaCl2 (0, 1, 2, 5, 10, and 15 g·L-1 referred to as Cont., C1, C2, C5, C10, and C15) were applied to solution - grown plant species. The survival rate, growth index, plant height, plant width, leaf width, leaf length, number of leaves, and relative chlorophyll contents were measured at monthly intervals. Euonymus japonicus, Hedera helix, and Peperomia puteolata survived up to C2, C5, and C10 at each CaCl2 concentration. The Euonymus japonicus was higher in the C1 treatment than in the Cont. for most growth characteristics. Hedera helix had the highest leaf width, leaf length, and number of leaves in the Cont., a significant difference was observed compared with the C1 treatment. The chlorophyll content did not differ significantly between the C5 and Cont. treatments. The leaf width and length of Peperomia puteolata were greater in the C2 and C1 treatments than in the Cont., whereas the number of leaves and chlorophyll content were the highest in C5. Dry weight analysis revealed that Euonymus japonicus, Hedera helix, and Peperomia puteolata were the lowest in the Cont. treatments. Euonymus japonicus was 74% in C15, and Hedera helix, and Peperomia puteolata were analyzed at approximately 37%- 50% and 9%-14%, respectively, regardless of the concentration in the CaCl2 treatment groups. In indoor hydroponic cultivation, the salt tolerance limit concentrations of Euonymus japonicus, Hedera helix, and Peperomia puteolata are 2, 5, and 10 g·L-1, respectively, indicating that hydroculture management techniques should be applied at higher concentrations.

A Study on University Library Development Plan: Focused on Rubric Evaluation (대학도서관 발전계획 분석 - 루브릭 평가를 중심으로 -)

  • Sun-Gu Jeon;Yong-Jae Lee
    • Journal of Korean Library and Information Science Society
    • /
    • v.55 no.1
    • /
    • pp.99-122
    • /
    • 2024
  • The purpose of this study is to analyze domestic academic library development plans, check whether key components are reflected, and seek ways to improve the establishment of academic library development plans. To this end, a rubric evaluation technique derived from research related to evaluation of foreign universities and libraries was used. The libraries of the top 15 domestic universities were selected by referring to the QS World University Evaluation and THE World University Evaluation as the subjects of the study, and how much the core components of the development plan were reflected were evaluated. The results of the study are as follows. First, as a result of evaluating the university library development plan, most of the contents of 'purpose', 'goal', and 'action plan' were reflected, but vulnerabilities were found in 'mission' and 'vision'. Second, some private academic libraries were moving toward strategic planning at the level of advanced countries, including all of the core components. Third, although most academic libraries specified 'purpose', it showed limitations due to perfunctory description and connection. In the comprehensive evaluation, out of the highest score of 15, 12 were good and 3 were poor, indicating that the development plans of domestic academic libraries were generally at a 'good' level. As an improvement measure, it was suggested to form a task force for development plan establishment, to disclose and promote development plans, and to strengthen education on development plans for librarians.

A Study on Setting Expected Targets for Satisfaction with the Frequency of Use of Construction Technology Information (건설기술정보의 활용 빈도 만족도에 대한 기대 목표치 설정에 관한 연구)

  • Seong-Yun Jeong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.58 no.2
    • /
    • pp.251-268
    • /
    • 2024
  • Recently, with the implementation of the "e-Government Performance Management Guidelines," there is a growing demand for setting performance indicators for information systems. For systems that provide information services to the public, such as CODIL, it is not easy to set performance indicators. This study presented a research model that applies Monte Carlo simulation to set expected performance targets that can be achieved through CODIL based on objective evidence. Among the survey contents conducted from 2015 to 2023, the statistical characteristics of user satisfaction regarding the frequency of use of construction technology information provided by CODIL were designated as input variables. Future expected targets and confidence intervals from 2024 to 2026 were designated as outcome variables. The expected target value was measured by generating 5 simulation alternatives and 1,000 random numbers for each alternative. Next, the measured expected goals were interpreted and compared with the results of time series regression analysis measured in previous studies. Although, as in previous studies, the expected target value could not be predicted based on time series regression analysis that considers the correlation between years. However, compared to previous studies, this study can be considered a more accurate analysis result because it predicted the expected target value based on 5,000 input variables.

Three Qualities of OTT Services: A Mixed Methods Approach (OTT 서비스의 세 가지 질적 요소: 혼합적 연구방법을 통한 접근)

  • Jae Sun Yoo;Jaecheol Park;Hyun Jun Jeon;Jai-Yeol Son
    • Information Systems Review
    • /
    • v.24 no.1
    • /
    • pp.59-87
    • /
    • 2022
  • Since over-the-top (OTT) service has emerged as a new way of consuming video contents, OTT markets grow exponentially and the competition among the OTT services becomes intense. Only limited systematic research effort has been paid to understand why users subscribe such OTT services among other services. Therefore, we used developmental sequential mixed methods approach to find out the quality factors and their effect on post-subscription experiences and continuance intention. In the qualitative study, we derived six factors which a user considers important to continue the subscription. Based on the explored factors, we hypothesized a research model with modified three qualities from ISSM. The proposed research model was validated through quantitative research, a survey of 226 OTT service users in South Korea, using structural equation modeling. The results indicated that content quality is the key factor affecting both perceived enjoyment and satisfaction whereas system quality affects satisfaction, and service quality only affects enjoyment. Enjoyment affects satisfaction which sequentially affects continuance usage intention. This study contributes to research by modifying ISSM through mixed methods. It also provides OTT service providers with insight to enhance users' post experience and continuance intention to use the service through qualities derived from the interview.

Analysis of Cyber Crime and Its Characteristics (사이버범죄 유형별 특징 분석 연구)

  • So-Hyun Lee;Ilwoong Kang;Yoonhyuk Jung;Hee-Woong Kim
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.1-26
    • /
    • 2019
  • Now we are facing with a possibility of having crimes, which have been only possible offline, in cyber spaces as well.Especially, a recent growth in the use of SNS, promoted by popularization of smart phones, also has led an abrupt increase in cyber crime. It would be important to have a understanding of cyber crime and its characteristics by type as well as factors associated with each type of cyber crime in order to devise appropriate preventive measures against cyber crime. However, most of the previous studies on cyber crimesolely made through literature review or indirect approaches. Therefore, this study has been designed to conduct the interview with actual suspects(criminals) of cyber crime to address factors of cyber crime and to devise specific preventive measures and countermeasures against cyber crime. Especially, among various types of cyber crime, this study aims at addressing the 'trades' and 'financial transaction' of crimes committed using the information and communication network and the 'cyber libel/insult'of crimes committed using unlicensed contents, which have been soared recently and become significant issues. The findings of this study could be beneficial for the society since it has managed to conduct the interview and reveal relationships among major factors of cyber crime. The findings of this study could be used for devising and developing proper preventive and countermeasures against cyber crime, in turn reducing and preventing its damage.

Do Users Always Trust More when Blog Posts are Related to the Blog's Theme?: The Degree of Relevance and Its Effect on Message Credibility (블로그의 포스트가 블로그의 테마와 관련이 있을 때 항상 더 사용자의 신뢰를 받는가?: 관련성의 정도가 메시지 신뢰성에 미치는 영향)

  • Jiyeol Kim;Cheul Rhee
    • Information Systems Review
    • /
    • v.20 no.2
    • /
    • pp.163-188
    • /
    • 2018
  • When people try to find restaurant information via search engine results, they look at posts not only from sites with solely restaurant reviews but also from sites with restaurant unrelated contents. This study aims to investigate whether relevance between post and blog type affects users' trust toward a review. This study also attempts to check if the above effects interact with age. We designed a restaurant review post for two different blogs: one featuring restaurant review and another that does not feature restaurant reviews. After our participants visited one restaurant review post, they answered our questionnaire. We conducted an online survey on 206 participants to test our research model. Results show that 1) the effect of relevance between post and blog type on message credibility, which is users' trust toward restaurant reviews, is not greater when posts are consistent with the theme of a blog. 2) Among users who are over 30 years old, relevance between post and blog type moderates the relationship between media skepticism, which is users' feeling of mistrust toward blog, and belief in expertise, that is, users' belief that the review post provides sufficient restaurant information. 3) Users' perceived value of the restaurant review post mediates the relationship between users' belief in the expertise in a post and users' intention to seek additional information.

The Effect of Message Completeness and Leakage Cues on the Credibility of Mobile Promotion Messages (기업의 스마트폰 메시지에 대한 고객 신뢰도에 관한 연구: 메시지 정교화 모델을 중심으로)

  • Hyun Jun Jeon;Jin Seon Choe;Jai-Yeol Son
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.61-80
    • /
    • 2018
  • Individuals often receive smishing campaigns (mobile phishing messages), which they treat as spam. Thus, firms should understand how their customers distinguish their promotion messages from smishing. However, only a few studies examined this important issue. The present study employs the elaboration likelihood model to develop research hypotheses on the relationship between message cue and message credibility. The message cue in this study is classified as content cue, which is found in the content of promotion messages, and as leakage cue, which is found in peripheral information in the message. Leakage cue includes orthography (inclusion of special characters)and an abbreviated link sent by a faithless sender. We also propose that contextualization has a moderating effect on the relationship between content cue and credibility. We conducted a survey experiment to examine the effect of message cues on message credibility in the context of respondents receiving discount coupons through mobile messages. The result of data analysis based on 166 responses suggests that leakage cue had a negative effect on message credibility. A message with defective content cue has a marginally negative effect on message credibility. In particular, defective content cue in a high-contextual message has a strong negative impact on message credibility. This effect was not observed in low-contextual messages. Moreover, message credibility is significantly low regardless of the degree of contextualization if there is a leakage cue in the message. Our findings suggest that mobile promotion messages should be customized for message receivers and should have no leakage cues.

Spatial and Temporal Variation of Surface Sediments by Tidal Environment Changes: Muan Bay, West Coast of Korea (조석환경 변화에 의한 표층퇴적물의 시.공간적 분포 변화: 한국 서해안의 무안만)

  • Ryu, Sang-Ock;Chang, Jin-Ho;Lee, Hee-Jun;Jo, Yeong-Jo;Choi, Ok-In
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.14 no.1
    • /
    • pp.10-21
    • /
    • 2009
  • Muan Bay has extensively undertaken artificial influences through a series of construction of dams and dykes nearby resulting in a substantial increase in highest high water level. To unravel sedimentary responses to the water level rise, we collected a number of surface sediment samples and hydrodynamic data from in-situ observations of tidal currents in Muan Bay in 1998 and 2007. Comparison of the data between 1998 and 2007 shows that the relative content of coarse fractions, sand and gravel, in the sediment samples has increased with a decreased mean size, on average, from 6.2 to 5.8${\phi}$ at the expense of silt contents. Such a coarsening trend, which is more evident around high water level, particularly on the tidal flats of Dongam-ri, Guro-ri and Aphae-do, is most likely attributable to rising water level. On the other hand, an increase of fine fractions locally in the western entrance of the bay can be explained with changes in characteristics of tidal currents imposed by construction of bridges therein, such as decreased velocities and varied direction and phase of the tidal currents.