• Title/Summary/Keyword: Division of Information System

Search Result 5,462, Processing Time 0.038 seconds

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Systemic Analysis on Hygiene of Food Catering in Korea (2005-2014) (Systemic analysis 방법을 활용한 국내 학교급식 위생의 주요 영향 인자 분석 연구(2005-2014))

  • Min, Ji-Hyeon;Park, Moon-Kyung;Kim, Hyun-Jung;Lee, Jong-Kyung
    • Journal of Food Hygiene and Safety
    • /
    • v.30 no.1
    • /
    • pp.13-27
    • /
    • 2015
  • A systemic review on the factors affecting food catering hygiene was conducted to provide information for risk management of food catering in Korea. In total 47 keywords relating to food catering and food hygiene were searched for published journals in the DBpia for the last decade (2005-2014). As a result, 1,178 published papers were searched and 142 articles were collected by the expert review. To find the major factors affecting food catering and microbial safety, an analysis based on organization and stakeholder were conducted. School catering (64 papers) was a major target rather than industry (5 pagers) or hospitals (3 papers) in the selected articles. The factors affecting school catering were "system/facility/equipment (15 papers)", "hygiene education (12 papers)", "production/delivery company (6 papers)", food materials (4 papers)" and "any combination of the above factors (9 papers)". The major problems are follow. 1) The problems of "system/facility/equipment" were improper space division/separation, lack of mass cooking utensil, lack of hygiene control equipment, difficulty in temperature and humidity control, and lack of cooperation in the HACCP team (dietitian's position), poor hygienic classroom in the case of class dining (students'), hard workload/intensity of labor, poor condition of cook's safety (cook's) and lack of parents' monitoring activity (parents'). 2) The problem of "hygiene education' were related to formal and perfunctory hygiene education, lack of HACCP education, lack of compliance of hygiene practice (cook's), lack of personal hygiene education and little effect of education (students'). 3) The problems of "production/delivery company" were related to hygiene of delivery truck and temperature control, hygiene of employee in the supplying company and control of non-accredited HACCP company. 4) The area of "food materials" cited were distrust of safety regarding to raw materials, fresh cut produces, and pre-treated food materials. 5) In addition, job stability/the salary can affect the occupational satisfaction and job commitment. And job stress can affect the performance and the hygiene practice. It is necessary for the government to allocate budget for facility and equipment, conduct field survey, improve hygiene training program and inspection, prepare certification system, improve working condition of employees, and introducing hygiene and layout consulting by experts. The results from this study can be used to prepare education programs and develop technology for improving food catering hygiene and providing information.

Trends and Prospects of Forest Meteorological Studies Based on the Publications in Korean Journal of Agricultural and Forest Meteorology (한국농림기상학회지 수록 논문에 기반한 산림기상 연구 추세와 전망)

  • Moon, Na Hyun;Shin, Man Yong;Moon, Ga Hyun;Chun, Junghwa
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.21 no.3
    • /
    • pp.121-134
    • /
    • 2019
  • This study was conducted to review the trends of forest meteorological studies based on the publications for last 20 years in Korean Journal of Agricultural and Forest Meteorology (KJAFM), and to provide insight for future prospect for researches in the field of forest meteorology. A total of 220 papers related to forest meteorology were published in KJAFM for the last 20 years. That corresponds to 33.5% out of all the papers including agricultural meteorology papers. To review the trends of forest meteorology studies, the 220 published papers were classified into seven categories. They are forest meteorology and forest fire, forest meteorology and tree physiology, forest meteorology and forest protection, micrometeorology in mountain area, climate and forest growth, climate and forest vegetation distribution, and climate change and forest ecosystem. Even if there were differences in paper numbers among the seven categories, it was found that various and very specific studies were conducted in the field of forest meteorology for the last 20 years. It was also expected that the accumulation and utilization of various and accurate forest meteorological information would bring remarkable progress of forest meteorological studies in the near future.

Distributions of Chromium, Copper, and Arsenic in Soils Adjacent to Stairs, a Deck, and a Sound Barrier Constructed with a Wood Preservative CCA-Treated Timbers (방부제 CCA로 처리된 목재를 사용한 계단, 데크 및 방음벽에 인접한 토양에서 크롬, 구리 및 비소의 분포)

  • Kim He-Kap;Kim Dong-Jin;Park Jeong-Gue;Shin Yong-Seung;Hwang In-Young;Kim Yoon-Kwan
    • Journal of Soil and Groundwater Environment
    • /
    • v.11 no.1
    • /
    • pp.54-64
    • /
    • 2006
  • Chromated copper arsenate (CCA), a wood preservative, has been widely used to protect wood products from attacks by bacteria, fungi and insects. However, the use of CCA is currently forbidden or limited to some applications in many countries because the toxic elements (Cr, Cu, and As) of CCA are released into the environments during outdoor uses, which may cause adverse health effects on humans and ecological systems. This study was conducted to investigate the distributions of chromium, copper and arsenic in soils adjacent to two CCA-treated wood structures. In a 7 month old pond entry structure, ten surface soil samples (0-2.5 cm) were collected at lateral distances of 0, 0.5, and 1 m from the stairway, and nine surface soil samples were collected beneath the deck. Nine top soil samples were taken from a 2 year old sound barrier structure at lateral distances of 0, 1, and 2 m. Background surface soil samples were also collected from each structure. Samples were analyzed for some physicochemical properties such as pH, electrical conductivity, organic matter content, and soil texture. Following the extraction of the elements with a microwave digestion system, samples were analyzed for Cr, Cu, and As. The concentrations of the three elements in soils adjacent to the structures were significantly elevated compared to the background levels, indicating that the elements have been leached out of the structures. Released e1ements showed lateral concentration gradients within 1 m. The elevations of the three elements in soils underneath the deck did not seem different (background-corrected concentrations: Cr, 5.01 mg/kg; Cu, 5.50 mg/kg; As, 4.91 mg/kg), while the elements in soils near the sound barrier were elevated in the order of As>Cu>Cr with measured concentrations of 49.7, 44.7 and 52.5 mg/kg, respectively. Background As, Cu, and Cr concentrations near the sound barrier were 9.88, 30.8, and 46.5 mg/kg, respectively. These results showed that CCA constituents are released into the environment and it is suggested that risk assessment need to be conducted to investigate harmful effects of the released elements on humans and ecological systems.

Korean Word Sense Disambiguation using Dictionary and Corpus (사전과 말뭉치를 이용한 한국어 단어 중의성 해소)

  • Jeong, Hanjo;Park, Byeonghwa
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.1-13
    • /
    • 2015
  • As opinion mining in big data applications has been highlighted, a lot of research on unstructured data has made. Lots of social media on the Internet generate unstructured or semi-structured data every second and they are often made by natural or human languages we use in daily life. Many words in human languages have multiple meanings or senses. In this result, it is very difficult for computers to extract useful information from these datasets. Traditional web search engines are usually based on keyword search, resulting in incorrect search results which are far from users' intentions. Even though a lot of progress in enhancing the performance of search engines has made over the last years in order to provide users with appropriate results, there is still so much to improve it. Word sense disambiguation can play a very important role in dealing with natural language processing and is considered as one of the most difficult problems in this area. Major approaches to word sense disambiguation can be classified as knowledge-base, supervised corpus-based, and unsupervised corpus-based approaches. This paper presents a method which automatically generates a corpus for word sense disambiguation by taking advantage of examples in existing dictionaries and avoids expensive sense tagging processes. It experiments the effectiveness of the method based on Naïve Bayes Model, which is one of supervised learning algorithms, by using Korean standard unabridged dictionary and Sejong Corpus. Korean standard unabridged dictionary has approximately 57,000 sentences. Sejong Corpus has about 790,000 sentences tagged with part-of-speech and senses all together. For the experiment of this study, Korean standard unabridged dictionary and Sejong Corpus were experimented as a combination and separate entities using cross validation. Only nouns, target subjects in word sense disambiguation, were selected. 93,522 word senses among 265,655 nouns and 56,914 sentences from related proverbs and examples were additionally combined in the corpus. Sejong Corpus was easily merged with Korean standard unabridged dictionary because Sejong Corpus was tagged based on sense indices defined by Korean standard unabridged dictionary. Sense vectors were formed after the merged corpus was created. Terms used in creating sense vectors were added in the named entity dictionary of Korean morphological analyzer. By using the extended named entity dictionary, term vectors were extracted from the input sentences and then term vectors for the sentences were created. Given the extracted term vector and the sense vector model made during the pre-processing stage, the sense-tagged terms were determined by the vector space model based word sense disambiguation. In addition, this study shows the effectiveness of merged corpus from examples in Korean standard unabridged dictionary and Sejong Corpus. The experiment shows the better results in precision and recall are found with the merged corpus. This study suggests it can practically enhance the performance of internet search engines and help us to understand more accurate meaning of a sentence in natural language processing pertinent to search engines, opinion mining, and text mining. Naïve Bayes classifier used in this study represents a supervised learning algorithm and uses Bayes theorem. Naïve Bayes classifier has an assumption that all senses are independent. Even though the assumption of Naïve Bayes classifier is not realistic and ignores the correlation between attributes, Naïve Bayes classifier is widely used because of its simplicity and in practice it is known to be very effective in many applications such as text classification and medical diagnosis. However, further research need to be carried out to consider all possible combinations and/or partial combinations of all senses in a sentence. Also, the effectiveness of word sense disambiguation may be improved if rhetorical structures or morphological dependencies between words are analyzed through syntactic analysis.

Study on Bandwidth and Characteristic Impedance of CWP3DCS (Coplanar Waveguide Employing Periodic 3D Coupling Structures) for the Development of a Radio Communication FISoC (Fully-integrated System on Chip) Semiconductor Device (완전집적형 무선통신 SoC 반도체 소자 개발을 위한 주기적인 3차원 결합구조를 가지는 코프레너 선로에 대한 대역폭 및 임피던스 특성연구)

  • Yun, Young
    • Journal of Navigation and Port Research
    • /
    • v.46 no.3
    • /
    • pp.179-190
    • /
    • 2022
  • In this study, we investigated the characteristic impedance and bandwidth of CPW3DCS (coplanar waveguide employing periodic 3D coupling structures), and examined its potential for the development of a marine radio communication FISoC (fully-integrated system on chip) semiconductor device. To extract bandwidth and characteristic impedance of the CPW3DC, we induced a measurement-based equation reflecting measured insertion loss, and compared the measured results of the propagation constant β and characteristic impedance with the measured ones. According to the results of the comparison, the calculated results show a good agreement with the measured ones. Concretely, the propagation constant β and characteristic impedance exhibited an maximum error of 3.9% and 6.4%, respectively. According to the results of this study, in a range of LT = 30 ~ 150 ㎛ for the length of periodic structures, the CPW3DC exhibited a passband characteristic of 121 GHz, and a very small dependency of characteristic impedance on frequency. We could realize a low impedance transmission line with a characteristic impedance lower than 20 Ω by using CPW3DCS with a line width of 20 ㎛, which was highly reduced, compared with a 3mm line width of conventional transmission line with the same impedance. The characteristic impedance was easily adjusted by changing LT. The above results indicate that the CPW3DC can be usefully used for the development of a wireless communication FISoC (fully-integrated system on chip) semiconductor device. This is the first report of a study on the bandwidth of the CPW3DC.

New Insights on Mobile Location-based Services(LBS): Leading Factors to the Use of Services and Privacy Paradox (모바일 위치기반서비스(LBS) 관련한 새로운 견해: 서비스사용으로 이끄는 요인들과 사생활염려의 모순)

  • Cheon, Eunyoung;Park, Yong-Tae
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.33-56
    • /
    • 2017
  • As Internet usage is becoming more common worldwide and smartphone become necessity in daily life, technologies and applications related to mobile Internet are developing rapidly. The results of the Internet usage patterns of consumers around the world imply that there are many potential new business opportunities for mobile Internet technologies and applications. The location-based service (LBS) is a service based on the location information of the mobile device. LBS has recently gotten much attention among many mobile applications and various LBSs are rapidly developing in numerous categories. However, even with the development of LBS related technologies and services, there is still a lack of empirical research on the intention to use LBS. The application of previous researches is limited because they focused on the effect of one particular factor and had not shown the direct relationship on the intention to use LBS. Therefore, this study presents a research model of factors that affect the intention to use and actual use of LBS whose market is expected to grow rapidly, and tested it by conducting a questionnaire survey of 330 users. The results of data analysis showed that service customization, service quality, and personal innovativeness have a positive effect on the intention to use LBS and the intention to use LBS has a positive effect on the actual use of LBS. These results implies that LBS providers can enhance the user's intention to use LBS by offering service customization through the provision of various LBSs based on users' needs, improving information service qualities such as accuracy, timeliness, sensitivity, and reliability, and encouraging personal innovativeness. However, privacy concerns in the context of LBS are not significantly affected by service customization and personal innovativeness and privacy concerns do not significantly affect the intention to use LBS. In fact, the information related to users' location collected by LBS is less sensitive when compared with the information that is used to perform financial transactions. Therefore, such outcomes on privacy concern are revealed. In addition, the advantages of using LBS are more important than the sensitivity of privacy protection to the users who use LBS than to the users who use information systems such as electronic commerce that involves financial transactions. Therefore, LBS are recommended to be treated differently from other information systems. This study is significant in the theoretical point of contribution that it proposed factors affecting the intention to use LBS in a multi-faceted perspective, proved the proposed research model empirically, brought new insights on LBS, and broadens understanding of the intention to use and actual use of LBS. Also, the empirical results of the customization of LBS affecting the user's intention to use the LBS suggest that the provision of customized LBS services based on the usage data analysis through utilizing technologies such as artificial intelligence can enhance the user's intention to use. In a practical point of view, the results of this study are expected to help LBS providers to develop a competitive strategy for responding to LBS users effectively and lead to the LBS market grows. We expect that there will be differences in using LBSs depending on some factors such as types of LBS, whether it is free of charge or not, privacy policies related to LBS, the levels of reliability related application and technology, the frequency of use, etc. Therefore, if we can make comparative studies with those factors, it will contribute to the development of the research areas of LBS. We hope this study can inspire many researchers and initiate many great researches in LBS fields.

A Study on the Cost Analysis of Service Export - K SME Case of MICE-related Industry - (서비스 수출원가 분석 - MICE 산업 관련 중소기업 사례연구 -)

  • Park, Moon-Suh
    • International Commerce and Information Review
    • /
    • v.13 no.4
    • /
    • pp.485-516
    • /
    • 2011
  • Republic of Korea is small nation that is comprised of 0.7% of the world population and occupying just 0.07% of the world territory. Despite this, Republic of Korea once again proved herself to be as the world's major economic powerhouse by becoming the world's 7th largest exporter in 2010. However, the reality is that Republic of Korea is still significantly concerned about the volatile economic nature and anxiety that is spread across the globe since the global depression that began at the end of 2008 and the financial crisis that has been threatening the Euro-Zone recently. This has resulted in the nation reaching the limitation in significant economic growth and limited creation of jobs within the nation and due to such circumstances, the nation is becoming more aware of the fact that she needs to pay more attention on the service sector and service exports if she was to see a more positive economic outlook in the upcoming future. This research is aimed to analyse the cost that is associated with the service export sector, by examining a number of enterprises in relation to the MICE(Meeting Incentives Convention Exhibition) industry which certainly has both direct and indirect influences on the service exports of the nation Further, the prime goal of the research is to encourage the SMEs of Korea, who have substandard experience associated to foreign exports, to intensify and increase service exports and also the goal extends to the degree to suggest appropriate assistance measures to aid these enterprises to achieve such goals. This research is fundamentally designed and based on the literature research associated with the MICE industry and also, this research is premeditated through the analysis of the case of exports to Vietnam. As the result of research, it has been found out that SMEs in the MICE industry and those of in service export sector are reluctant or even feel insecure to attempt any kind of export of their services mainly due to; the lack of foreign market information and also the lack of experience associated with service exports. Furthermore, it has also been revealed that the difficulty to estimate the validity and profitability of service the export is a significant factor withholding those enterprises from attempting any service export to the foreign markets. Henceforth, in order to aid and stimulate service export to the foreign markets by these SMEs (including those in association with the MICE industry), it is imperative to prepare an one-stop service export assistance program which would provide the information associated with marketing, law and legislation, taxation system and financial area in regard to the global markets.

  • PDF

Detection of Phantom Transaction using Data Mining: The Case of Agricultural Product Wholesale Market (데이터마이닝을 이용한 허위거래 예측 모형: 농산물 도매시장 사례)

  • Lee, Seon Ah;Chang, Namsik
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.161-177
    • /
    • 2015
  • With the rapid evolution of technology, the size, number, and the type of databases has increased concomitantly, so data mining approaches face many challenging applications from databases. One such application is discovery of fraud patterns from agricultural product wholesale transaction instances. The agricultural product wholesale market in Korea is huge, and vast numbers of transactions have been made every day. The demand for agricultural products continues to grow, and the use of electronic auction systems raises the efficiency of operations of wholesale market. Certainly, the number of unusual transactions is also assumed to be increased in proportion to the trading amount, where an unusual transaction is often the first sign of fraud. However, it is very difficult to identify and detect these transactions and the corresponding fraud occurred in agricultural product wholesale market because the types of fraud are more intelligent than ever before. The fraud can be detected by verifying the overall transaction records manually, but it requires significant amount of human resources, and ultimately is not a practical approach. Frauds also can be revealed by victim's report or complaint. But there are usually no victims in the agricultural product wholesale frauds because they are committed by collusion of an auction company and an intermediary wholesaler. Nevertheless, it is required to monitor transaction records continuously and to make an effort to prevent any fraud, because the fraud not only disturbs the fair trade order of the market but also reduces the credibility of the market rapidly. Applying data mining to such an environment is very useful since it can discover unknown fraud patterns or features from a large volume of transaction data properly. The objective of this research is to empirically investigate the factors necessary to detect fraud transactions in an agricultural product wholesale market by developing a data mining based fraud detection model. One of major frauds is the phantom transaction, which is a colluding transaction by the seller(auction company or forwarder) and buyer(intermediary wholesaler) to commit the fraud transaction. They pretend to fulfill the transaction by recording false data in the online transaction processing system without actually selling products, and the seller receives money from the buyer. This leads to the overstatement of sales performance and illegal money transfers, which reduces the credibility of market. This paper reviews the environment of wholesale market such as types of transactions, roles of participants of the market, and various types and characteristics of frauds, and introduces the whole process of developing the phantom transaction detection model. The process consists of the following 4 modules: (1) Data cleaning and standardization (2) Statistical data analysis such as distribution and correlation analysis, (3) Construction of classification model using decision-tree induction approach, (4) Verification of the model in terms of hit ratio. We collected real data from 6 associations of agricultural producers in metropolitan markets. Final model with a decision-tree induction approach revealed that monthly average trading price of item offered by forwarders is a key variable in detecting the phantom transaction. The verification procedure also confirmed the suitability of the results. However, even though the performance of the results of this research is satisfactory, sensitive issues are still remained for improving classification accuracy and conciseness of rules. One such issue is the robustness of data mining model. Data mining is very much data-oriented, so data mining models tend to be very sensitive to changes of data or situations. Thus, it is evident that this non-robustness of data mining model requires continuous remodeling as data or situation changes. We hope that this paper suggest valuable guideline to organizations and companies that consider introducing or constructing a fraud detection model in the future.

Status of the Constitutional Court Records Management and Improvement (헌법재판소 기록관리현황과 개선방안)

  • Lee, Cheol-Hwan;Lee, Young-Hak
    • The Korean Journal of Archival Studies
    • /
    • no.38
    • /
    • pp.75-124
    • /
    • 2013
  • This study aims, by paying attention to the special values of records of Constitutional Court, to discuss the characteristics of them and figuring out their present state, and to suggest some measures for improvement in the records management. First of all, I defined the concept of the records of Constitutional Court and its scope, and made an effort to comprehend their types and distinct features, and on the basis of which I tried to grasp the characteristics of the records. Put simply, the records of Constitutional Court are essential records indispensible to the application of Constitutional Court's documentation strategy of them, and they are valuable particularly at the level of the taking-root of democracy and the guarantee of human rights in a country. Owing to their characteristics of handling nationally important events, also, the context of the records is far-reaching to the records of other constitutional institutions and administrations, etc. In the second place, I analyzed Records Management Present State. At a division stage, I grasped the present state of creation, registration, and classification system of records. At an archives repository stage, I made efforts to figure out specifically the perseveration of records and the present of state of using them. On the basis of such figuring-outs of the present situation of records of Constitutional Court, I pointed at problems in how to manage them and suggested some measures to improve it in accordance with the problems, by dividing its process into four, Infrastructure, Process, Opening to the public and Application. In the infrastructure process, after revealing problems in its system, facilities, and human power, I presented some ways to improve it. In terms of its process, by focusing on classification and appraisal, I pointed out problems in them and suggested alternatives. In classification, I suggested to change the classification structure of trial records; in appraisal, I insisted on reconsidering the method of appropriating the retention periods of administration records, for it is not correspondent with reality in which, even in an file of a event, there are several different retention periods so it is likely for the context of the event worryingly to be segmented. In opening to the public and application, I pointed at problems in information disclosure at first, and made a suggestion of the establishment of a wide information disclosure law applicable to all sort of records. In application, I contended the expansion of the possibility of application of records and the scope of them through cooperation with other related-institutions.