• Title/Summary/Keyword: Information Assessment

Search Result 5,572, Processing Time 0.031 seconds

A Study on Exploring Digital Information Service Method through Analysis of PISA 2018 Reading Literacy Assessment Framework (PISA 2018 독서 리터러시 평가틀 분석을 통한 디지털 정보 서비스 방안 탐색)

  • Park, Juhyeon;Ranasinghe, W.M. Tharanga Dilruk
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.1
    • /
    • pp.135-159
    • /
    • 2021
  • The purpose of this study is to derive the implications needed to improve reading and information literacy and provide information services for students and citizens through changes in the concept of PISA 2018 Reading Literacy and its Assessment Framework analysis. The findings of the study are as follows. First, meaning of PISA Reading Literacy concept has changed along with the changes of the social and technological environments. Second, concept and assessment framework included the whole process of reading. Third, the Assessment Framework included a number of factors similar to the cognitive process of the information literacy model like Big6 Skills, but also there were differences. Fourth, the digital reading is reflected in the Assessment Framework. The PISA 2018 Reading Literacy Assessment Framework provides implications for the standards and methods required for librarians to develop reading and information literacy models and assessment frameworks to improve citizens' reading and information literacy, and to provide information services to them.

A Security Assessment on the Designated PC service

  • Lee, Kyungroul;Yim, Kangbin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.12
    • /
    • pp.61-66
    • /
    • 2015
  • In this paper, we draw a security assessment by analyzing possible vulnerabilities of the designated PC service which is supposed for strengthening security of current online identification methods that provide various areas such as the online banking and a game and so on. There is a difference between the designated PC service and online identification methods. Online identification methods authenticate an user by the user's private information or the user's knowledge-based information, though the designated PC service authenticates a hardware-based unique information of the user's PC. For this reason, high task significance services employ with online identification methods and the designated PC service for improving security multiply. Nevertheless, the security assessment of the designated PC service has been absent and possible vulnerabilities of the designated PC service are counterfeiter and falsification when the hardware-based unique-information is extracted on the user's PC and sent an authentication server. Therefore, in this paper, we analyze possible vulnerabilities of the designated PC service and draw the security assessment.

A Case Study of Course-Embedded Assessment for Program Outcomes in Computer Science & Information Engineering (컴퓨터·정보공학 분야의 교과기반 학습성과 평가 사례연구)

  • Cho, Soosun
    • Journal of Internet Computing and Services
    • /
    • v.17 no.1
    • /
    • pp.73-81
    • /
    • 2016
  • This paper deals with the practical experience and lessons to develop a method of course-embedded assessment for program outcomes in Computer Science & Information Engineering. In engineering education, ABEEK(Accreditation Board for Engineering Education of Korea) has been nominated as an official accreditation from Korean government under some conditions of fulfillment. One of the conditions is enforcement of course-embedded assessment for program outcomes. In this paper, a method of course-embedded assessment in Computer Science & Information Engineering is suggested. The case study was done in a basic project course which includes the special assessment methods in project courses. The case study of course-embedded assessment in a basic project course was given with consideration for each step, that is, set up of program outcomes which are highly related to the course, selection of assessment tools such as written examination and project-based assessment, set up of assessment criteria, implementation of course-embedded assessment, and analysis of results. The proposed method is expected to be a good example to construct the whole strategy for course-embedded assessment in Computer Science & Information Engineering.

Credibility Assessment of Online Information in Context

  • Rieh, Soo Young
    • Journal of Information Science Theory and Practice
    • /
    • v.2 no.3
    • /
    • pp.6-17
    • /
    • 2014
  • The purpose of this study is to examine to what extent the context in which people interact with online information affects people's credibility perceptions. In this study, credibility assessment is defined as perceptions of credibility relying on individuals' expertise and knowledge. Context has been characterized with respect to three aspects: Context as user goals and intentions, context as topicality of information, and context as information activities. The data were collected from two empirical studies. Study 1 was a diary study in which 333 residents in Michigan, U.S.A. submitted 2,471 diary entries to report their trust perceptions associated with ten different user goals and nine different intentions. Study 2 was a lab-based study in which 64 subjects participated in performing four search tasks in two different information activity conditions - information search or content creation. There are three major findings of this study: (1) Score-based trust perceptions provided limited views of people's credibility perceptions because respondents tended to score trust ratings consistently high across various user goals and intentions; (2) The topicality of information mattered more when study subjects assessed the credibility of user generated content (UGC) than with traditional media content (TMC); (3) Subjects of this study exerted more effort into making credibility judgments when they engaged in searching activities than in content creation. These findings indicate that credibility assessment can or should be seen as a process-oriented notion incorporating various information use contexts beyond simple rating-based evaluation. The theoretical contributions for information scientists and practical implications for web designers are also discussed.

A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement

  • Park, Jun-Young;Huh, Eui-Nam
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.61-82
    • /
    • 2020
  • The security risk management used by some service providers is not appropriate for effective security enhancement. The reason is that the security risk management methods did not take into account the opinions of security experts, types of service, and security vulnerability-based risk assessment. Moreover, the security risk assessment method, which has a great influence on the risk treatment method in an information security risk assessment model, should be security risk assessment for fine-grained risk assessment, considering security vulnerability rather than security threat. Therefore, we proposed an improved information security risk management model and methods that consider vulnerability-based risk assessment and mitigation to enhance security controls considering limited security budget. Moreover, we can evaluate the security cost allocation strategies based on security vulnerability measurement that consider the security weight.

A Research on Institution's Countermeasure for Personal Information Protection Act Based on the Examples of Performing the Privacy Impact Assessment (개인정보 영향평가 수행 사례에 기반한 기관의 개인정보보호법 대응방안에 관한 연구)

  • Cho, Sung Kyu;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.89-98
    • /
    • 2012
  • According to the enforcement of Personal Information Protection Act as of September 2011, the laws and regulations for the protection of personal information that were applied only to the certain sectors such as information & communication network, financial institutions, public sector etc. for the time being has been expanded to apply to all public and private sectors to process personal information. In particular, because the public institutions are obliged to be mandatorily conducted of the Privacy Impact Assessment, it will be enforced in earnest for each agency's informationization business that handles personal information. In this paper, I examine the most derived vulnerability and set up the improvement measure to supplement it with the examples of 10 of all the institutions conducting the Privacy Impact Assessment in the year 2011. And, I suggest the measures to be prepared by the institutions to observe the Personal Information Protection Act.

Web based Online Outage Cost Assessment and Information System of Electrical Energy (웹기반 온라인 전기에너지 공급지장비 추정 및 정보 시스템의 개발)

  • Lim, Jin-Taek;Choi, Jae-Seok;Jeon, Dong-Hoon;Seo, Chul-Soo;Lee, Jae-Gul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.9
    • /
    • pp.1249-1259
    • /
    • 2012
  • This paper proposes a Web Based Online Outage Cost Assessment and Information System(WOOCAIS) for power system outage cost assessment. The proposed WOOCAIS is a kind of web based survey method for outage cost assessment. While conventional survey methods have done outage cost assessment based on survey paper lists collected by post mail or visiting customers, the proposed WOOCAIS is a web based online survey operation and assessment system. Therefore, it can curtail expenditure for survey and also is more convenient than conventional method. It will be set up for actual outage cost assessment system of KEPCO in South Korea in the near future. The WOOCAIS will be applied in various research and actual planning and operation areas. First of all, the assessed results may be not only applied as one of objective function for generation system and grid expansion but also operational planning problems in power system.

Participatory Web Users’ Information Activities and Credibility Assessment

  • Rieh, Soo-Young
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.4
    • /
    • pp.155-178
    • /
    • 2010
  • Assessment of information credibility is a ubiquitous human activity given that people constantly make decisions and selections based on the value of information in a variety of information seeking and use contexts. Today, people are increasingly engaging in diverse online activities beyond searching for and reading information, including activities such as creating, tagging and rating content, shopping, and listening to and watching multimedia content. The Web 2.0 environment presents new challenges for people because the burden of information evaluation is shifted from professional gatekeepers to individual information consumers. At the same time, however, it also provides unprecedented opportunities for people to use tools and features that help them to make informed credibility judgments by relying on other people's ratings and recommendations. This paper introduces fundamental notions and dimensions of credibility, and contends that credibility assessment can be best understood with respect to human information behavior because it encompasses both the level of effort people exert as well as the heuristics they employ to evaluate information. The paper reports on a survey study investigating people's credibility judgments with respect to online information, focusing on the constructs, heuristics, and interactions involved in people's credibility assessment processes within the context of their everyday life information activities. Using an online activity diary method, empirical data about people's online activities and their associated credibility assessments were collected at multiple points throughout the day for three days. The results indicate that distinct credibility assessment heuristics are emerging as people engage in diverse online activities involving more user-generated and multimedia content. A heuristic approach suggests that people apply mental shortcuts or rules of thumb in order to minimize the amount of cognitive effort and time required to make credibility judgments. The paper discusses why a heuristic approach is key to reaching a more comprehensive understanding of people's credibility assessments within the information-abundant online environment.

BIM Application Process for Facility Condition Assessment Documentation Work

  • Yoo, Seung Eun;Yu, Jung Ho
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.268-270
    • /
    • 2015
  • Overseas countries' government and facility management industries make efforts to ensure precise and fluent data from building information modeling (BIM). In facility management, a large amount of data and information are necessary to continue the process activities. Facility condition assessment, which is performed to make budget plan for the maintenance and operation requires the related facilities' documentation and information. However, it depends on the owner and the user of the facility to provide accurate and complete information to consultant. The problems as follows: (1) owner and user should provide documents and information, and (2) the consultant cannot verify the provided information. To solve these problems, we suggest a methodology to produce the information for FCA through BIM. First, all of the essential documentation and assessment elements are listed. Next, the documents and elements are separated out, whether they are able to be extracted from BIM or not. Then, the list indicates only the data that is linked with BIM. The suggestion is expected to provide the required information through the connection to BIM with accuracy and completeness and to present another BIM application use for facility management.

  • PDF