• Title/Summary/Keyword: Digital Items

Search Result 604, Processing Time 0.033 seconds

A Study on a Re-Thesis Necessity of Software Quality evaluation Methodology using AHP method (AHP기법을 이용한 소프트웨어 품질 평가 방법론 재정립 방안에 관한 연구)

  • Sung, Kyung Sang;Choi, In Hwa;Hwang, Jun;Park, Chan Kil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.263-272
    • /
    • 2009
  • Nowadays, lots of software that have similar functions is being produced. Hence it is getting more important to select the best and suitable software for each individual or company. Moreover, there are few trustworthy materials regarding to the objective procedure and criteria for the best evaluation of the software quality. To overcome these problems, benchmarking has been carried out. However, benchmarking is also confronting the limit of quality evaluation verification due to the difficult of the objectification of the major test items. To solve these problems, some others try to evaluate the quality of software using objective criteria of evaluation based on ISO/IEC standards. Nevertheless, this method using these defined evaluation items and criteria may result in not very reliable outcome. Therefore, this paper offers the evaluation items reflected in the characteristics of each software in order to prove the validity of the proposed method. Moreover, the objective and quantitative criterion which analyzes and reflects the organization characteristics using AHP methodology is applied to the experiment and performance evaluation. Hence we expect that the proposed method provides the needs of the re-establishment of software quality evaluation criteria and the improvement of process in terms of management.

An Analysis of the Importance among the Items in the Secure Coding used by the AHP Method (AHP기법을 이용한 시큐어 코딩의 항목 간 중요도 분석)

  • Kim, Chi-Su
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.257-262
    • /
    • 2015
  • The ministry of security and public administration provide the secure coding guide that can remove the vulnerability of applications and defend cyber attack from the coding step because cyber attack like the hacking about 75% abusing the vulnerability of applications. In this paper we find the oder of priority and did the criticality analysis used by AHP about 7 items in the secure coding which the ministry of security and public administration provide. The result is decided that 'exception handling' is the most important item. There is no secure coding items in software supervision currently, therefore the result of the research will make good use audit standards in the process of the software development.

Development of Case Management Activities Inventory in Community Welfare Centers (사회복지관 사례관리 활동목록 개발)

  • Min, So-Young
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.489-497
    • /
    • 2017
  • The purpose of this study is to develop case management activities inventory and analyze the perception on case management practice using importance-performance analysis(IPA) in community welfare centers. The comprehensive literature review and the content analysis from the professional scholar and social workers produced 89 items of case management activities items. A survey was conducted to 277 case managers in community welfare centers. The exploratory factor analysis, reliability and validity analysis developed the case management activities inventory comprised of 11 factors and 61 items. Suggestions were made to improve case management practice in community welfare centers.

A Situation-Based Recommendation System for Exploiting User's Mood (사용자의 기분을 고려하기 위한 상황 기반 추천 시스템)

  • Kim, Younghyun;Lim, Woo Sub;Jeong, Jae-Han;Lee, Kyoung-Jun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.3
    • /
    • pp.129-137
    • /
    • 2019
  • Recommendation systems help users by suggesting items such as products, services, and information. However, most research on recommendation systems has not considered people's moods although the appropriate contents recommended to people would be changed by people's moods. In this paper, we propose a situation-based recommendation system which exploits people's mood. The proposed scheme is based on the fact that the mood of a user is changed frequently by the surrounding environments such as time, weather, and anniversaries. The environments are defined as feature identifications, and the rating values on items are stored as feature identifications at a database. Then, people can be recommended diverse items according to their environments. Our proposed scheme has some advantages such as no problem of cold start, low processing overhead, and serendipitous recommendation. The proposed scheme can be also a good option as of assistance to other recommendation systems.

Protection of MPEG-2 Multicast Streaming in an IP Set-Top Box Environment

  • Hwang, Seong-Oun;Kim, Jeong-Hyon;Nam, Do-Won;Yoon, Ki-Song
    • ETRI Journal
    • /
    • v.27 no.5
    • /
    • pp.595-607
    • /
    • 2005
  • The widespread use of the Internet has led to the problem of intellectual property and copyright infringement. Digital rights management (DRM) technologies have been developed to protect digital content items. Digital content can be classified into static content (for example, text or media files) and dynamic content (for example, VOD or multicast streams). This paper deals with the protection of a multicast stream on set-top boxes connected to an IP network. In this paper, we examine the following design and architectural issues to be considered when applying DRM functions to multicast streaming service environments: transparent streaming service and large-scale user environments. To address the transparency issue, we introduce a 'selective encryption scheme'. To address the second issue, a 'key packet insertion scheme' and 'hierarchical key management scheme' are introduced. Based on the above design and architecture, we developed a prototype of a multicasting DRM system. The analysis of our implementation shows that it supports transparent and scalable DRM multicasting service in a large-scale user environment.

  • PDF

A Study on the Current State of Digital Divide in Korea and the Countermeasure (대한민국 정보 격차 현황과 대책에 대한 연구)

  • Choi, Choong-Hyun;Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.33 no.A
    • /
    • pp.81-88
    • /
    • 2013
  • In this paper, we study the current situation of digital divide caused by accessibility disparity to information in Korea. We investigate leading causes and classes of people of digital divide, and also investigate phenomena which arise from such digital divide. In the investigation, we survey related works and additionally carry out questionnaire study in which we make questionnaire items ourselves. Finally, we discuss various measures to resolve digital divide in Korea based on the study results.

  • PDF

Needs Analysis of Digital Citizenship Education for University Students in South Korea: Using Importance-Performance Analysis

  • YOON, Seonghye;KIM, Seyoung;JUNG, Yeonji
    • Educational Technology International
    • /
    • v.20 no.1
    • /
    • pp.1-24
    • /
    • 2019
  • The purpose of this study is to determine priorities for designing digital citizenship education based on the key indicators of importance-performance. Survey data were collected from 283 university students in South Korea and analyzed with Importance-Performance Analysis to diagnose the current level of digital citizenship and draw their needs for educational treatment. The results showed that for all the factors except the Technical Skills (TS), the level of importance was significantly higher than that of performance. Another finding indicated that in the Importance-Performance matrix all the factors were located in the first quadrant (i.e. maintaining the current state) and the third quadrant (i.e. low demands for improvement). Specifically, two items located in the second quadrant where urgent treatment is required could have to do with the increasingly active participation in socio-political issues raised in South Korea. This study offered a window into what to focus on when designing digital citizenship education based on the systematic analysis of the needs for digital citizenship education in South Korea.

Audio Resource Adaptation (오디오 신호의 적응 방법)

  • 오은미
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1419-1422
    • /
    • 2003
  • Multimedia contents what we call Digital Items include various types of resources such as music, speech, text, video, graphics, and so on. The current Adaptation QoS described in the ISO/IEC 21000-7 CD-Part 7: Digital Item Adaptation, however, lacks adaptation methods for audio signals. The goal of this paper is to provide adaptation methods that are necessary to deal with audio signals. Two operations are introduced in order to adapt audio items. One method is to make use of the functionality of Fine Grain Scalability, and the other is intended to drop the channel of audio output channel. This paper provides a DIA description tool that associates the operators with the corresponding values of the constraint and the utility. Furthermore, the operations are evaluated and compared to alternative solutions.

  • PDF

A Study on Protection Technology Criteria for Preventing Contents Abuse on On-line (온라인상의 콘텐츠 오남용 방지를 위한 보호기술 기준에 대한 연구)

  • Hong, Sung-Hyuk;Yoon, Eun-Jun;Han, Jae-Hong;Park, Jong-Hyuk
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.432-437
    • /
    • 2009
  • Due to fast development of communications, knowledge and information have been become digitalized and distributed actively. However, the misuse and abuse of digital properties and security problems frequently take place. In this paper, we analyze the cases of the misuse and abuse of contents and the contents protection technology. We propose important items for protection technology to prevent contents from misuse and abuse based on results of the analyses. These important items are expected to be used as important factors for establishing protection technology standards.

  • PDF

A study on the Fleet-type Overseas Expansion Strategy through mutual cooperation between Small & Medium and Large enterprises for the successful export of IT industry

  • Kim, Seon-Bae
    • Journal of Digital Convergence
    • /
    • v.9 no.1
    • /
    • pp.13-24
    • /
    • 2011
  • IT is the core industry in Korea which has the most international competitiveness and counts for 35% of the total exports of Korea. Nevertheless, it tends to be concentrated in small range of items, a few countries and mostly large companies. Therefore, it is needed for small and medium-sized enterprises which can have prompt decision making processes and various changes to export wide range of items and to diverse countries. This study will introduce 'the fleet-type expansion strategy of overseas export' that is about large and small enterprises perform the appropriate role based on their own character, thus they produce the mutual benefit. This strategy will contribute to improve the export structure of Korea and perform the major role for Korea's IT industry to become the dynamic force for growth in the future.