• Title/Summary/Keyword: IT information

Search Result 89,673, Processing Time 0.077 seconds

A Study on the Classification of Cyber Dysfunction and the Social Cognition Analysis in the Intelligent Information Society (지능정보사회의 사이버 역기능 분류와 사회적 인식 분석)

  • Lim, Gyoo Gun;Ahn, Jae Ik
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.55-69
    • /
    • 2020
  • The Internet cyber space has become more important as it enters the intelligent information society of the 4th Industrial Revolution beyond the information age through the development of ICT, the expansion of personalized services through mobile and SNS, the development of IoT, big data, and artificial intelligence. The Internet has formed a new paradigm in human civilization, but it has focused only on the efficiency of its functions. Therefore, various side effects such as information divide, cyber terrorism, cyber violence, hacking, and personal information leakage are emerging. In this situation, facing the intelligent information society can lead to an uncontrollable chaos. Therefore, this study classifies the cyber dysfunction of intelligent information society and analyzes social cognition, suggests cyber dysfunction standard of intelligent information society, and examines the seriousness of dysfunction, and suggests technical research directions for future technologies and services. The dysfunctional classification of the intelligent information society was classified into five areas of cyber crime and terrorism, infringement of rights, intelligent information usage culture, intelligent information reliability, and social problems by FGI methodology. Based on the classification, the social perception of current and future cyber dysfunction severity was surveyed and it showed female is more sensitive than male about the dysfunction. A GAP analysis confirmed social awareness that the future society would be more serious about AI and cyber crime

Optimization of Information Security Investment Considering the Level of Information Security Countermeasure: Genetic Algorithm Approach (정보보호 대책 수준을 고려한 정보보호 투자 최적화: 유전자 알고리즘 접근법)

  • Lim, Jung-Hyun;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.18 no.5
    • /
    • pp.155-164
    • /
    • 2019
  • With the emergence of new ICT technologies, information security threats are becoming more advanced, intelligent, and diverse. Even though the awareness of the importance of information security increases, the information security budget is not enough because of the lack of effectiveness measurement of the information security investment. Therefore, it is necessary to optimize the information security investment in each business environment to minimize the cost of operating the information security countermeasures and mitigate the damages occurred from the information security breaches. In this paper, using genetic algorithms we propose an investment optimization model for information security countermeasures with the limited budget. The optimal information security countermeasures were derived based on the actual information security investment status of SMEs. The optimal solution supports the decision on the appropriate investment level for each information security countermeasures.

The Effects of COVID-19 Risk Information Seeking and Processing on its Preventive Behaviors and Information Sharing (코로나19 (COVID-19) 관련 위험정보 탐색과 처리가 코로나19 예방 행동 및 정보 공유에 미치는 영향)

  • Park, Minjung;Chai, Sangmi
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.65-81
    • /
    • 2020
  • This study aims to examine the effects of users' perceptions of COVID-19 risk on their seeking and processing of relevant information as COVID-19 emerges and spreads worldwide in 2019. We apply the risk information seeking and processing model (RISP Model) to verify whether users' COVID-19 related information seeking and processing behaviors have a positive effect on their preventive and information sharing behaviors. To achieve this research goal, an online survey was conducted with about 400 of social media users. The users' perceptions of risk for COVID-19 increased their perceived insufficiency of COVID-19 information. In addition, the perceived insufficiency of users' information formed a positive relationship with seeking and searching of information behaviors. The processing of COVID-19 related information has increased related preventive behaviors and sharing of information through social media. While searching for information related to COVID-19 prompted personal information sharing behaviors, it did not significantly affect preventive behaviors. Accordingly, in order to promote COVID-19 preventive behaviors as well as overall user health-related behaviors it can be inferred that additional measures are needed in addition to pursuing relevant information.

A Development of Evaluation Indicators for Information Security by Means of the Coincidence Analyses (부합성 분석을 통한 정보보안 평가지표 개발)

  • Lee, Yeong-Kyu;Kim, Sang-Hoon
    • Journal of Information Technology Services
    • /
    • v.7 no.3
    • /
    • pp.175-198
    • /
    • 2008
  • The wide spread of the Internet has become a momentum to promote informatization, and thus individuals, organizations, and government bodies are competitively participating in this kind of new wave. Informatization enables us not only to circulate and utilize information without any limitation but also to maximize users' benefits and convenience. On the other hand, it brings about negative effects-security incidents such as cyber terror, Internet fraud and technology leakage, etc. Evaluation on security level should precede over all the others in order to minimize damage by security incidents since it diagnoses current status on security as it is and can be used as a guideline for appropriate security management. In this study, evaluation domains, items and indicators of information security to evaluate information security are theoretically developed on the basis of critically reviewing the major existing research. And then the coincidence level(content validity, ease and reliability of evaluation) of each evaluation indicators are empirically analyzed through performing the field study of 83 information security experts.

Personalized Information Retrieval Method considering Participating Device in Internet of Things (사물인터넷에서 참여 기기를 고려한 개인화 정보 검색 기법)

  • Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.21-31
    • /
    • 2020
  • Internet of Things is growing rapidly. As it evolves, the amount of data is increasing significantly. It requires a new personalized information retrieval method. Internet of Things is defined as uniquely identifiable interoperable connected object. The first definition of Internet of Things was from Things oriented perspective. However, previous studies about personalized information retrieval method do not consider Things. To meet user's individual needs, previous studies concentrate on only human, not Things. In this paper, we propose a personalized information retrieval method considering participating device in Internet of Things. It provides personalized information using data type preference for each device. Moreover, it provides personalized results by integrating data type preference for set of devices. This paper describes a new personalized retrieval method and algorithm. It consists of five steps. Then, it presents four scenarios using proposed method. The scenarios show our work is more effective and efficient than existing one.

Copyright and Digital Information (저작권자 디지털 정보)

  • Yoon, Sun-Young
    • Journal of Information Management
    • /
    • v.30 no.4
    • /
    • pp.27-38
    • /
    • 1999
  • Information storage and it's usual patterns are digitised within the changes of the social environment to the information center from the library. In this aspect, it examines to use for digital information and a concept of copyright. And it reviews a role as information specialist in the digital era.

  • PDF

Evaluation of Public Information Security Training Programs : A Case Study (공공부문 정보보호 교육과정의 평가 : 사례 연구)

  • Lee, Song-ha;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.173-185
    • /
    • 2020
  • It is very important to evaluate training because it can systematically grasp the current status of training. Evaluation includes getting ongoing feedback from the learner, trainer and learner's supervisor, to improve the quality of the training and identify if the learner achieved the goals of the training. It also provides a justification for the implementation of training. Nonetheless, there is a lack of studies that attempt to evaluate information security training programs. In this study, we utilize the Philips model to evaluate the public training programs for the people who are in charge of the information security duties in the public sector and propose the training improvement plans. Research result has shown that it is necessary to evaluate the level of the trainees in advance and conduct training programs according to the information security skill level. In addition, it needs to conduct training according to duties such as information security management, information security operate and maintain. The limitation of this study is that each education program was not assessed individually because this study had developed an evaluation tool that could be used comprehensively.

Issues on the Patient's Information Protection (환자 의료정보 보호의 문제)

  • Jeong, Bu-Gyun
    • The Korean Society of Law and Medicine
    • /
    • v.9 no.2
    • /
    • pp.339-382
    • /
    • 2008
  • Medical information is one of significant private information that includes in-dividual's own diverse information. Once opened, it exposes one's health condition and medical history to a third party, which could bring about serious troubles. On this account, the third parties are of much concerns about the information. If medical information collected through various routes is used with another purpose, oilier than the initial intention, it might cause serious results beyond one's control. Thus, it is essential to keep the information confidential. Also, the discrimination based on the medical information ought to be banned because it is likely to happen that exposed information socially stigmatizes a person, being discriminated in a work place or a school when he/she is employed or gets an insurance. In the current system, only medical institutions are responsible for protecting or securing medical records. Despite the information technology development and the increased interests in medical information, there are quite a few limitations in legal, technical, and administrative aspects. All kinds of organizations, involved in collecting and using the information, as well as medical institutions primarily producing and managing it should share the responsibilities.

  • PDF

RIMS project application raising for a public transportation immediacy operation (공공교통 전동차 안전운행을 위한 RIMS 프로젝트 적용 제고)

  • Son Young-Jin;Lee Kang-won;Bang yeon-goon;Lee do-sun
    • Proceedings of the KSR Conference
    • /
    • 2005.11a
    • /
    • pp.897-901
    • /
    • 2005
  • 21 century as the knowledge information anger society now our society industry of all fields the rolling stock maintenance conservative standardization enterprise where information anger is being turning out construction Ministry of Transportation supported with continuous development of the supply section substitution quantity information processing system which the information highway is quick and the Korean railroad technical research worker propelled the enterprise as the subjective agency, it contracted this for a vehicle field information anger system construction in link of the enterprise our construction and an agreement, information technique composed the consortium t9day and it propelled a system codevelopment. The SMSC who is a front-runner of Maj loach city railroad operation agency to 'here business relates with a vehicle field maintenance conservativeness an immediacy operation and generally and information anger it will plan it will integrate it will own jointly and business efficiency and in the dictionary an obstacle occurrence electromotive car maintenance conservative information and it will improve only maintenance conservativeness of preventive maintenance of the electromotive car it knows it will prevent to construct the maintenance conservative system of the preventive maintenance, it applied the RIMS project to sleep.

  • PDF

The Effects of Information Quality on Call Center Agents' Individual Impacts : Focused on Call Center Customer Service Information Systems (콜센터 고객정보시스템의 정보품질이 상담원 업무 성과에 미치는 영향에 관한 연구)

  • Yang, Dong Hyun;An, Joon Mo;Hahm, Yu Kun;Min, Hyoung Jin
    • Journal of Information Technology Services
    • /
    • v.13 no.1
    • /
    • pp.87-101
    • /
    • 2014
  • This paper is a study on information Quality of Domestic Call Center Information System; recognized the importance of information quality and analyzed the impact on use and satisfaction of users following information quality which is a success element and ultimately the impact on user's performance by expanding information quality evaluating model by Jeong-Woo Lee et al.(2003) who reflected domestic special corporate culture based on information system success model by DeLone and McLean(2003). This is meaningful in providing theoretical foundation for efficient information quality supply and building quality management system at call center in future and provides hints to be considered in raising understanding of consultants on provided information and arranging ground that can utilize it in a timely manner.