• Title/Summary/Keyword: IT information

Search Result 89,673, Processing Time 0.097 seconds

Automatic Face Identification System Using Adaptive Face Region Detection and Facial Feature Vector Classification

  • Kim, Jung-Hoon;Do, Kyeong-Hoon;Lee, Eung-Joo
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1252-1255
    • /
    • 2002
  • In this paper, face recognition algorithm, by using skin color information of HSI color coordinate collected from face images, elliptical mask, fratures of face including eyes, nose and mouth, and geometrical feature vectors of face and facial angles, is proposed. The proposed algorithm improved face region extraction efficacy by using HSI information relatively similar to human's visual system along with color tone information about skin colors of face, elliptical mask and intensity information. Moreover, it improved face recognition efficacy with using feature information of eyes, nose and mouth, and Θ1(ACRED), Θ2(AMRED) and Θ 3(ANRED), which are geometrical face angles of face. In the proposed algorithm, it enables exact face reading by using color tone information, elliptical mask, brightness information and structural characteristic angle together, not like using only brightness information in existing algorithm. Moreover, it uses structural related value of characteristics and certain vectors together for the recognition method.

  • PDF

An Empirical Study of Intention of Usage of Health Information on the Internet: Comparison by Gender (인터넷에서 건강정보 이용의도에 대한 실증 연구: 성별에 따른 비교)

  • Lim, Se-Hun;Lee, Sung-Ho;Kim, Dae-Kil
    • Journal of Information Technology Services
    • /
    • v.10 no.3
    • /
    • pp.77-94
    • /
    • 2011
  • Since the general quality of life has been improving, people have become interested in "well-being." The widespread acceptance of the importance of "well-being" to quality of life has encouraged people to take more interest in getting health information online when they need it. Expansive use of online health information suggests that individual characteristics (i.e., gender and other traits), Website features, and perceived trust are related to the primary concern for many online health information consumers. This study examines whether familiarity, perceived security, and reputation of health information on various Websites influence the relationship of trust and intention to use by gender. These research results will contribute to the adoption of online health information by gender and, moreover, will provide companies with an understanding of key characteristics of consumers who use emoticons and provide useful implications for marketing strategies to current and future consumers.

A Study on Feature Information Parsing System of Video Image for Multimedia Service (멀티미디어 서비스를 위한 동영상 이미지의 특징정보 분석 시스템에 관한 연구)

  • 이창수;지정규
    • Journal of Information Technology Applications and Management
    • /
    • v.9 no.3
    • /
    • pp.1-12
    • /
    • 2002
  • Due to the fast development in computer and communication technologies, a video is now being more widely used than ever in many areas. The current information analyzing systems are originally built to process text-based data. Thus, it has little bits problems when it needs to correctly represent the ambiguity of a video, when it has to process a large amount of comments, or when it lacks the objectivity that the jobs require. We would like to purpose an algorithm that is capable of analyze a large amount of video efficiently. In a video, divided areas use a region growing and region merging techniques. To sample the color, we translate the color from RGB to HSI and use the information that matches with the representative colors. To sample the shape information, we use improved moment invariants(IMI) so that we can solve many problems of histogram intersection caused by current IMI and Jain. Sampled information on characteristics of the streaming media will be used to find similar frames.

  • PDF

An Operational Concept for Information Systems: A Case of the D Information Resource Management Information System (정보시스템 운영개념 연구: D정보자원관리시스템 사례)

  • Lee, Sang-Ho;Sim, Seung-Bae
    • Journal of Information Technology Services
    • /
    • v.5 no.1
    • /
    • pp.129-147
    • /
    • 2006
  • This study analyzed an operational concept for the D Information Resource Management Information System (DIRMIS) to manage any IT resources effectively in defense area. We first deduced the concept of the information resource management (IRM) for defense area from the literature review, and we suggested a guideline, which has used in defense area, of the documentation for the operational concept description (OCD). Moreover, we developed the operational concept for the DIRMIS following the guideline. Especially, this study is a practical approach for suggesting of a case, and the share of accumulated cases will contribute to advance in System Integration (SI) industry as well as academic research.

The ISO the research also the ISMS security maturity of 27001 regarding a measurement modeling (ISO 27004 information security management measurement and metric system) (ISO 27001의 ISMS 보안성숙도 측정 모델링에 관한 연구 (ISO 27004 정보보호관리 측정 및 척도 체계))

  • Kim, Tai-Dal
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.153-160
    • /
    • 2007
  • Recently, the demand against the system risk analysis and security management from the enterprises or the agencies which operate a information system is increasing even from domestic. The international against the standardization trend of information protection management system it investigates from the dissertation which it sees. It analyzed and against information property information protection management system integrated it will be able to manage a danger modeling it did it proposed. Having analyzed as well as compared the matureness of security-measurement models in regard to the global standard of proposal system, the administrative presentation for various IT technology resources. which have been managed singly so far, is now well applied under the united control of the company itself, and enabled the automated management of authentication support and renewal for ISO 27001, ISO 9000, ISO 14000, resulting in much advanced operation for both material and human resources.

  • PDF

IT Governance Mediated the Effect of Human Resource Capability on Information Systems Outsourcing Success (인적자원능력이 정보시스템 아웃소싱 성공에 미치는 영향에 있어서 IT거버넌스의 매개효과)

  • Lee, Jong-Man
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.285-293
    • /
    • 2009
  • The purpose of this paper is to examine IT governance mediated the effect of human resource capability on information systems outsourcing success. The survey method was used for this paper, and data from a total of 108 companies that were listed greater than $10 million were used for the analysis. And structural equation model was used to analyze the data. The results of this empirical study is summarized as followings. First, human resource capability do not have a direct effect on information systems outsourcing success but IT governance mediates the effect of human resource capability. Second, preparedness capability and relationship capability have positive effect on the IT governance. The findings have significant implications for IT governance in information systems outsourcing.

Sustainable Information Technology and Information System: A Systematic Literature Review, Taxonomy, and Agenda for Future Research

  • Parvathi Jayaprakash;Rupesh Kumar Pati
    • Asia pacific journal of information systems
    • /
    • v.33 no.2
    • /
    • pp.468-512
    • /
    • 2023
  • Sustainable Information Technology (IT) and Sustainable Information Systems (IS) were synonymous with Green IT-IS until recently the studies focused on sustainable IT-IS encompassing the interaction between economy, society, and environment. Here, is an attempt to understand the development in the emerging field of Sustainable IT-IS from Green IT-Green IS. The studies in the area of Sustainable IT-IS spare address diverse topics. This study attempts to provide a framework for the field of research and indicate potential research directions in the sustainable IT-IS domain. A detailed comparative analysis approach of 296 papers has been used to understand the progress of management research in Sustainable IT-IS vis-à-vis Green IT-IS. The review analyses the collated literature to understand the trends across the study period, development across various economies/ geographies, methodological approaches used, behavioral and theoretical aspects investigated, and finally, develop a taxonomy based on identified theses in the field of study. The study highlights that developed countries focus more on studies on the Sustainable IT-IS domain compared to other economies. It was evident that sustainable IS has received very limited focus. The study identifies 7 major themes and 29 subthemes forming the area of study during the evolution of Sustainable IT-IS through Green IT-IS. Subsequently, taxonomy was proposed to identify future research initiatives for investigation. The review comparing the evolution of research on managerial issues on Sustainable IT-IS vis-à-vis Green IT-IS is provided perhaps for the first time. The study provides an avenue for future research in the upcoming domain of Sustainable IT-IS.

The Effect of Information Security Certification Announcement on the Market Value of Firms (기업의 정보보호 인증이 기업가치에 미치는 영향)

  • Park, Jaeyoung;Jung, Woo-Jin;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.15 no.3
    • /
    • pp.51-69
    • /
    • 2016
  • Recently, many Korean firms have suffered financial losses and damaged firm's trust due to information security incidents. Hence, a lot of firms have realized the importance of the information security. In particular, the demand for information security certification has increased. This study examined the effect of information security certification using the event study methodology. Our research shows that the announcement of the information security certification significantly influences the market value of the corresponding firm. The certified firms rise, on average, o.4993% (-2 day), 0.5462% (+1 day) of their market value. Further, we found that the financial sector in our data showed a 1.4% higher abnormal returns than the nonfinancial sector. On the other hand, whether a firm first acquired the information security certification is not significant. Our paper presents that it is possible to analyze the effect of the information security certification using the event study. We are expected to be used in making a decision for the investment of information security. Also, our results indicate that the firm which have acquired the information security certification should actively announce that fact.

Study on Plans to Improve Small and Medium Corporations' Technological Protections Using Information Security Management System (ISMS) (정보보호관리체계(ISMS)를 이용한 중소기업 기술보호 개선방안 연구)

  • Kim, Jungeun;Kim, Seongjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.33-54
    • /
    • 2016
  • In the modern society based on information and communication, which is exposed to the risks of a lot of information security breaches, corporate information assets may be an economical scale in a country. Most of damages derived from corporate technological information leak often occur in small and medium corporations. Although many information security managers in corporations have focused on certification systems such as information security management system, small and medium corporations are poorly aware of the information security, and their environments surrounding it should be also improved. In addition, it is difficult to expect spontaneous participations in it, since the sustainable information security management systems are often not forced to be certified. Thus, the purpose of this study is to examine plans to improve small and medium corporations' technological protections by using some component of the information security management system. On the basis of this examination, it also attempts to discuss some methods for effective and efficient information security in the small and medium corporations' technological protections.

Risk Analysis for Protecting Personal Information in IoT Environments (사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크)

  • Lee, Ae Ri;Kim, Beomsoo;Jang, Jaeyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.