• Title/Summary/Keyword: Digital Information Management

Search Result 5,575, Processing Time 0.037 seconds

A Study on the University Archives: The Concept and Contents of University Archives (대학 Archives란 무엇인가: Archives의 개념과 내용)

  • 전상숙
    • Journal of Korean Library and Information Science Society
    • /
    • v.32 no.2
    • /
    • pp.289-306
    • /
    • 2001
  • This paper seeks to know a out the 'University and College Archives', which are to be established under the provision of 'the Law on the Management of the Institutions', and briefly mention the relation with the library, looking into the concept and backgrounds of archives. The enactment of the law became the ground to establish but there is no practical guidelines on the structure, formation, management, and contents of archives, even worse, people do not know well what the archives is. Therefore, I think so know about academic archives should start understanding basic concept, meaning, and necessities of the archives. In Europe, university archives have been established from 1830s, after the other archives had been established. In America, universities, which had been grown owe to the rapid economic development and the increasing of high educated people, began to establish their archives as a way to invest to improve their being and promote continuing growth. This is to prove their being and value in the society by collecting and preserving records and documents produced in the development of universities. Therefore, university archives can be said that it is the receiving agency for the producers of the university records, researching functional purpose, contents of university records, and relation with other institutions or records. This is the very difference from university libraries as collecting agencies. Nevertheless, university libraries and archives can help each other to activate their functions and improve their positions in universities through cooperating for the policy of digital records preserving and approaching them because the tendency of informationization forces universities to stand on various information resources to serve for routine university works. Each institutions of universities needs archival records due to various reasons. It is especially necessary to preserve and manage archival records to prove the confidence of records.

  • PDF

Standardization and Management of Interface Terminology regarding Chief Complaints, Diagnoses and Procedures for Electronic Medical Records: Experiences of a Four-hospital Consortium (전자의무기록 표준화 용어 관리 프로세스 정립)

  • Kang, Jae-Eun;Kim, Kidong;Lee, Young-Ae;Yoo, Sooyoung;Lee, Ho Young;Hong, Kyung Lan;Hwang, Woo Yeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.679-687
    • /
    • 2021
  • The purpose of the present study was to document the standardization and management process of interface terminology regarding the chief complaints, diagnoses, and procedures, including surgery in a four-hospital consortium. The process was proposed, discussed, modified, and finalized in 2016 by the Terminology Standardization Committee (TSC), consisting of personnel from four hospitals. A request regarding interface terminology was classified into one of four categories: 1) registration of a new term, 2) revision, 3) deleting an old term and registering a new term, and 4) deletion. A request was processed in the following order: 1) collecting testimonies from related departments and 2) voting by the TSC. At least five out of the seven possible members of the voting pool need to approve of it. Mapping to the reference terminology was performed by three independent medical information managers. All processes were performed online, and the voting and mapping results were collected automatically. This process made the decision-making process clear and fast. In addition, this made users receptive to the decision of the TSC. In the 16 months after the process was adopted, there were 126 new terms registered, 131 revisions, 40 deletions of an old term and the registration of a new term, and 1235 deletions.

A Study on the Performance Verification Method of Small-Sized LTE-Maritime Transceiver (소형 초고속해상무선통신망 송수신기 성능 검증 방안에 관한 연구)

  • Seok Woo;Bu-young Kim;Woo-Seong Shim
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.7
    • /
    • pp.902-909
    • /
    • 2023
  • This study evaluated the performance test of a small-sized LTE-Maritime(LTE-M) transceiver that was developed and promoted to expand the use of intelligent maritime traf ic information services led by the Ministry of Oceans and Fisheries with the aim of supporting the prevention of maritime accidents. Accoriding to statistics, approximately 30% of all marine accidents in Korean water occur with ships weighing less than 3 tons. Therefore, the blind spots of maritime safety must be supplemented through the development of small-sized transceivers. The small transceiver may be used in fishing boats that are active near coastal waters and in water leisure equipment near the coastline. Therefore, verifying whether sufficient performance and stable communication quality are provided is necessary, considering the environment of their real usage. In this study, we reviewed the communication quality goals of the LTE-M network and the performance requirements of small-sized transceivers suggested by the Ministry of Oceans and Fisheries, and proposed a test plan to appropriately evaluate the performance of small-sized transceivers. The validity of the proposed test method was verified for six real-sea areas with a high frequency of marine accidents. Consequently, the downlink and uplink transmission speeds of the small-sized LTE-M transceiver showed performances of 9 Mbps or more and 3 Mbps or more, respectively. In addition, using the coverage analysis system, coverage of more than 95% and 100% were confirmed in the intensive management zone (0-30 km) and interesting zone (30-50 km), respectively. The performance evaluation method and test results proposed in this paper are expected to be used as reference materials for verifying the performance of transceivers, contributing to the spread of government-promoted e-navigation services and small-sized transceivers.

Herbal Medicines for the Improvement of Immune Function in Patients with Cancer: A Protocol for Systematic Review and Meta-Analysis (한약의 암 환자에 대한 면역기능 개선 효과 : 체계적 문헌고찰과 메타분석 프로토콜)

  • Young-Min Cho;Soobin Jang;Mi Mi Ko;Han-eum Joo;Hwa-Seung Yoo;Mi-Kyung Jeong
    • The Journal of Internal Korean Medicine
    • /
    • v.45 no.3
    • /
    • pp.335-341
    • /
    • 2024
  • Objectives: Patients with cancer eventually fail to respond to therapy when malignant cells develop effective ways to evade immunosurveillance. Conventional cancer treatments, such as radiation therapy and chemotherapy, aim to cure the disease or prolong the patient's life. However, the toxicity and side effects of conventional treatments limit their efficacy. Herbal medicine is a typical complementary and integrative form of medicine for cancer treatment in Asia. This protocol evaluates the effectiveness of herbal medicines in improving the immune function of patients with cancer. Methods: The following electronic databases will be searched: MEDLINE via PubMed, EMBASE via Elsevier, Cochrane Central Register of Controlled Trials, China National Knowledge Infrastructure (CNKI), and Korean databases including Regional Information Sharing Systems (RISS), National Digital Science Library (NDSL), and Oriental Medicine Advanced Searching Integrated System (OASIS). Additionally, prospective randomized controlled trials that evaluate the effectiveness of herbal medicines on immune function in patients with cancer will be included in this review. All outcomes related to the immune function of patients with cancer (e.g., CD3, CD4, CD8, CD4/CD8 ratio, CD19 (B cells), dendritic cells (CD11), CD56 (NK cells), and macrophages) will be included in this review. Results: This review is expected to provide data on the effectiveness of herbal medicines on improving immune functions in patients with cancers. Conclusion: This systematic review will help patients and clinicians establish new management options for cancer treatment.

A CF-based Health Functional Recommender System using Extended User Similarity Measure (확장된 사용자 유사도를 이용한 CF-기반 건강기능식품 추천 시스템)

  • Sein Hong;Euiju Jeong;Jaekyeong Kim
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.3
    • /
    • pp.1-17
    • /
    • 2023
  • With the recent rapid development of ICT(Information and Communication Technology) and the popularization of digital devices, the size of the online market continues to grow. As a result, we live in a flood of information. Thus, customers are facing information overload problems that require a lot of time and money to select products. Therefore, a personalized recommender system has become an essential methodology to address such issues. Collaborative Filtering(CF) is the most widely used recommender system. Traditional recommender systems mainly utilize quantitative data such as rating values, resulting in poor recommendation accuracy. Quantitative data cannot fully reflect the user's preference. To solve such a problem, studies that reflect qualitative data, such as review contents, are being actively conducted these days. To quantify user review contents, text mining was used in this study. The general CF consists of the following three steps: user-item matrix generation, Top-N neighborhood group search, and Top-K recommendation list generation. In this study, we propose a recommendation algorithm that applies an extended similarity measure, which utilize quantified review contents in addition to user rating values. After calculating review similarity by applying TF-IDF, Word2Vec, and Doc2Vec techniques to review content, extended similarity is created by combining user rating similarity and quantified review contents. To verify this, we used user ratings and review data from the e-commerce site Amazon's "Health and Personal Care". The proposed recommendation model using extended similarity measure showed superior performance to the traditional recommendation model using only user rating value-based similarity measure. In addition, among the various text mining techniques, the similarity obtained using the TF-IDF technique showed the best performance when used in the neighbor group search and recommendation list generation step.

A Study on Ontology and Topic Modeling-based Multi-dimensional Knowledge Map Services (온톨로지와 토픽모델링 기반 다차원 연계 지식맵 서비스 연구)

  • Jeong, Hanjo
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.4
    • /
    • pp.79-92
    • /
    • 2015
  • Knowledge map is widely used to represent knowledge in many domains. This paper presents a method of integrating the national R&D data and assists of users to navigate the integrated data via using a knowledge map service. The knowledge map service is built by using a lightweight ontology and a topic modeling method. The national R&D data is integrated with the research project as its center, i.e., the other R&D data such as research papers, patents, and reports are connected with the research project as its outputs. The lightweight ontology is used to represent the simple relationships between the integrated data such as project-outputs relationships, document-author relationships, and document-topic relationships. Knowledge map enables us to infer further relationships such as co-author and co-topic relationships. To extract the relationships between the integrated data, a Relational Data-to-Triples transformer is implemented. Also, a topic modeling approach is introduced to extract the document-topic relationships. A triple store is used to manage and process the ontology data while preserving the network characteristics of knowledge map service. Knowledge map can be divided into two types: one is a knowledge map used in the area of knowledge management to store, manage and process the organizations' data as knowledge, the other is a knowledge map for analyzing and representing knowledge extracted from the science & technology documents. This research focuses on the latter one. In this research, a knowledge map service is introduced for integrating the national R&D data obtained from National Digital Science Library (NDSL) and National Science & Technology Information Service (NTIS), which are two major repository and service of national R&D data servicing in Korea. A lightweight ontology is used to design and build a knowledge map. Using the lightweight ontology enables us to represent and process knowledge as a simple network and it fits in with the knowledge navigation and visualization characteristics of the knowledge map. The lightweight ontology is used to represent the entities and their relationships in the knowledge maps, and an ontology repository is created to store and process the ontology. In the ontologies, researchers are implicitly connected by the national R&D data as the author relationships and the performer relationships. A knowledge map for displaying researchers' network is created, and the researchers' network is created by the co-authoring relationships of the national R&D documents and the co-participation relationships of the national R&D projects. To sum up, a knowledge map-service system based on topic modeling and ontology is introduced for processing knowledge about the national R&D data such as research projects, papers, patent, project reports, and Global Trends Briefing (GTB) data. The system has goals 1) to integrate the national R&D data obtained from NDSL and NTIS, 2) to provide a semantic & topic based information search on the integrated data, and 3) to provide a knowledge map services based on the semantic analysis and knowledge processing. The S&T information such as research papers, research reports, patents and GTB are daily updated from NDSL, and the R&D projects information including their participants and output information are updated from the NTIS. The S&T information and the national R&D information are obtained and integrated to the integrated database. Knowledge base is constructed by transforming the relational data into triples referencing R&D ontology. In addition, a topic modeling method is employed to extract the relationships between the S&T documents and topic keyword/s representing the documents. The topic modeling approach enables us to extract the relationships and topic keyword/s based on the semantics, not based on the simple keyword/s. Lastly, we show an experiment on the construction of the integrated knowledge base using the lightweight ontology and topic modeling, and the knowledge map services created based on the knowledge base are also introduced.

The Impact of Perceived Risks Upon Consumer Trust and Purchase Intentions (인지된 위험의 유형이 소비자 신뢰 및 온라인 구매의도에 미치는 영향)

  • Hong, Il-Yoo B.;Kim, Woo-Sung;Lim, Byung-Ha
    • Asia pacific journal of information systems
    • /
    • v.21 no.4
    • /
    • pp.1-25
    • /
    • 2011
  • Internet-based commerce has undergone an explosive growth over the past decade as consumers today find it more economical as well as more convenient to shop online. Nevertheless, the shift in the common mode of shopping from offline to online commerce has caused consumers to have worries over such issues as private information leakage, online fraud, discrepancy in product quality and grade, unsuccessful delivery, and so forth, Numerous studies have been undertaken to examine the role of perceived risk as a chief barrier to online purchases and to understand the theoretical relationships among perceived risk, trust and purchase intentions, However, most studies focus on empirically investigating the effects of trust on perceived risk, with little attention devoted to the effects of perceived risk on trust, While the influence trust has on perceived risk is worth studying, the influence in the opposite direction is equally important, enabling insights into the potential of perceived risk as a prohibitor of trust, According to Pavlou (2003), the primary source of the perceived risk is either the technological uncertainty of the Internet environment or the behavioral uncertainty of the transaction partner. Due to such types of uncertainty, an increase in the worries over the perceived risk may negatively affect trust, For example, if a consumer who sends sensitive transaction data over Internet is concerned that his or her private information may leak out because of the lack of security, trust may decrease (Olivero and Lunt, 2004), By the same token, if the consumer feels that the online merchant has the potential to profit by behaving in an opportunistic manner taking advantage of the remote, impersonal nature of online commerce, then it is unlikely that the merchant will be trusted, That is, the more the probable danger is likely to occur, the less trust and the greater need to control the transaction (Olivero and Lunt, 2004), In summary, a review of the related studies indicates that while some researchers looked at the influence of overall perceived risk on trust level, not much attention has been given to the effects of different types of perceived risk, In this context the present research aims at addressing the need to study how trust is affected by different types of perceived risk, We classified perceived risk into six different types based on the literature, and empirically analyzed the impact of each type of perceived risk upon consumer trust in an online merchant and further its impact upon purchase intentions. To meet our research objectives, we developed a conceptual model depicting the nomological structure of the relationships among our research variables, and also formulated a total of seven hypotheses. The model and hypotheses were tested using an empirical analysis based on a questionnaire survey of 206 college students. The reliability was evaluated via Cronbach's alphas, the minimum of which was found to be 0.73, and therefore the questionnaire items are all deemed reliable. In addition, the results of confirmatory factor analysis (CFA) designed to check the validity of the measurement model indicate that the convergent, discriminate, and nomological validities of the model are all acceptable. The structural equation modeling analysis to test the hypotheses yielded the following results. Of the first six hypotheses (H1-1 through H1-6) designed to examine the relationships between each risk type and trust, three hypotheses including H1-1 (performance risk ${\rightarrow}$ trust), H1-2 (psychological risk ${\rightarrow}$ trust) and H1-5 (online payment risk ${\rightarrow}$ trust) were supported with path coefficients of -0.30, -0.27 and -0.16 respectively. Finally, H2 (trust ${\rightarrow}$ purchase intentions) was supported with relatively high path coefficients of 0.73. Results of the empirical study offer the following findings and implications. First. it was found that it was performance risk, psychological risk and online payment risk that have a statistically significant influence upon consumer trust in an online merchant. It implies that a consumer may find an online merchant untrustworthy if either the product quality or the product grade does not match his or her expectations. For that reason, online merchants including digital storefronts and e-marketplaces are suggested to pursue a strategy focusing on identifying the target customers and offering products that they feel best meet performance and psychological needs of those customers. Thus, they should do their best to make it widely known that their products are of as good quality and grade as those purchased from offline department stores. In addition, it may be inferred that today's online consumers remain concerned about the security of the online commerce environment due to the repeated occurrences of hacking or private information leakage. Online merchants should take steps to remove potential vulnerabilities and provide online notices to emphasize that their website is secure. Second, consumer's overall trust was found to have a statistically significant influence on purchase intentions. This finding, which is consistent with the results of numerous prior studies, suggests that increased sales will become a reality only with enhanced consumer trust.

A Study on the Establishment Case of Technical Standard for Electronic Record Information Package (전자문서 정보패키지 구축 사례 연구 - '공인전자문서보관소 전자문서 정보패키지 기술규격 개발 연구'를 중심으로-)

  • Kim, Sung-Kyum
    • The Korean Journal of Archival Studies
    • /
    • no.16
    • /
    • pp.97-146
    • /
    • 2007
  • Those days when people used paper to make up and manage all kinds of documents in the process of their jobs are gone now. Today electronic types of documents have replaced paper. Unlike paper documents, electronic ones contribute to the maximum job efficiency with their convenience in production and storage. But they too have some disadvantages; it's difficult to distinguish originals and copies like paper documents; it's not easy to examine if there is a change or damage to the documents; they are also prone to alteration and damage by the external influences in the electronic environment; and electronic documents require enormous amounts of workforce and costs for immediate measures to be taken according to the changes to the S/W and H/W environment. Despite all those weaknesses, however, electronic documents increasingly account for more percentage in the current job environment thanks to their job convenience and efficiency of production costs. Both the government and private sector have made efforts to come up with plans to maximize their advantages and minimize their risks at the same time. One of the methods is the Authorized Retention Center which is described in the study. There are a couple of prerequisites for its smooth operation; they should guarantee the legal validity of electronic documents in the administrative aspects and first secure the reliability and authenticity of electronic documents in the technological aspects. Responding to those needs, the Ministry of Commerce, Industry and Energy and the Korea Institute for Electronic Commerce, which were the two main bodies to drive the Authorized Retention Center project, revised the Electronic Commerce Act and supplemented the provisions to guarantee the legal validity of electronic documents in 2005 and conducted researches on the ways to preserve electronic documents for a long term and secure their reliability, which had been demanded by the users of the center, in 2006. In an attempt to fulfill those goals of the Authorized Retention Center, this study researched technical standard for electronic record information package of the center and applied the ISO 14721 information package model that's the standard for the long-term preservation of digital data. It also suggested a process to produce and manage information package so that there would be the SIP, AIP and DIP metadata features for the production, preservation, and utilization by users points of electronic documents and they could be implemented according to the center's policies. Based on the previous study, the study introduced the flow charts among the production and progress process, application methods and packages of technical standard for electronic record information package at the center and suggested some issues that should be consistently researched in the field of records management based on the results.

Detection Ability of Occlusion Object in Deep Learning Algorithm depending on Image Qualities (영상품질별 학습기반 알고리즘 폐색영역 객체 검출 능력 분석)

  • LEE, Jeong-Min;HAM, Geon-Woo;BAE, Kyoung-Ho;PARK, Hong-Ki
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.3
    • /
    • pp.82-98
    • /
    • 2019
  • The importance of spatial information is rapidly rising. In particular, 3D spatial information construction and modeling for Real World Objects, such as smart cities and digital twins, has become an important core technology. The constructed 3D spatial information is used in various fields such as land management, landscape analysis, environment and welfare service. Three-dimensional modeling with image has the hig visibility and reality of objects by generating texturing. However, some texturing might have occlusion area inevitably generated due to physical deposits such as roadside trees, adjacent objects, vehicles, banners, etc. at the time of acquiring image Such occlusion area is a major cause of the deterioration of reality and accuracy of the constructed 3D modeling. Various studies have been conducted to solve the occlusion area. Recently the researches of deep learning algorithm have been conducted for detecting and resolving the occlusion area. For deep learning algorithm, sufficient training data is required, and the collected training data quality directly affects the performance and the result of the deep learning. Therefore, this study analyzed the ability of detecting the occlusion area of the image using various image quality to verify the performance and the result of deep learning according to the quality of the learning data. An image containing an object that causes occlusion is generated for each artificial and quantified image quality and applied to the implemented deep learning algorithm. The study found that the image quality for adjusting brightness was lower at 0.56 detection ratio for brighter images and that the image quality for pixel size and artificial noise control decreased rapidly from images adjusted from the main image to the middle level. In the F-measure performance evaluation method, the change in noise-controlled image resolution was the highest at 0.53 points. The ability to detect occlusion zones by image quality will be used as a valuable criterion for actual application of deep learning in the future. In the acquiring image, it is expected to contribute a lot to the practical application of deep learning by providing a certain level of image acquisition.

Study on the Effect of Self-Disclosure Factor on Exposure Behavior of Social Network Service (자기노출 요인이 소셜 네트워크 서비스의 노출행동에 미치는 영향에 관한 연구)

  • Do Soon Kwon;Seong Jun Kim;Jung Eun Kim;Hye In Jeong;Ki Seok Lee
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.209-233
    • /
    • 2016
  • Internet companies that utilize social network have increased in number. The introduction of diverse social media services facilitated innovative changes in e-business. Social network service (SNS), which is a domain of social media, is a web-based service designed to strengthen human relations in the Internet and build new social relations. The remarkable growth of social network services and the profit generation and perception of this service are the new growth engines of this digital age. Given this development, many global IT companies views SNS as the most powerful form of social media. Thus, they invest efforts to develop business models using SNS.2) This study verifies the impact of privacy exposure in SNS as a result of privacy invasion. This study examines the purpose of using the SNS and user's awareness of the significance of personal information, which are key factors that affect self-disclosure of personal information. This study utilizes theory of reasoned action (TRA) to provide a theoretical platform that describes the specific behavior and emotional response of individuals. This study presents a research model that considers negative attitude (negatude). In this model, self-disclosure in SNS is considered a TRA. TRA is a subjective norm, a behavioral intention, and a key variable of exposure behavior. A survey was conducted on college students at Y university in Seoul to empirically verify the research model. The students have experiences in using SNS. A total of 198 samples were collected. Path analysis was applied to analyze the relations of factors. The results of path analysis show the statistically insignificant impact of privacy invasion on negatude, subjective norm, behavioral intention, and exposure behavior. The impact of unrecognized privacy invasion was also considered insignificant. The impacts of intention to use SNS on negatude, subjective norm, behavioral intention, and exposure behavior was significant. A significant impact was also found for the significance of personal information on subjective norm, behavioral intention, and exposure behavior, whereas the impact on negatude was insignificant. The impact of subjective norm on behavioral intention was significant. Lastly, the impact of behavioral intention on exposure behavior was insignificant. These findings are significant because the study examined the process of self-disclosure by integrating psychological and social factors based on theoretical discussion.