• Title/Summary/Keyword: Information Reliance

Search Result 169, Processing Time 0.022 seconds

Consumer Information Search According to Prior knowledge and Degree of Importance of Products (소비자 제품지식과 제품속성의 중요도에 따른 정보탐색)

  • 이승신
    • Journal of Families and Better Life
    • /
    • v.15 no.4
    • /
    • pp.41-54
    • /
    • 1997
  • The purpose of this study is to analyze information search according to consumer's prior knowledge and degree of importance of products. Questionnare survey method was used in this research. The sample was taken from 548 university students in Seoul from 19th of June to 26th of June in 1997. Statistical methods used in this study were Frequency, Percentage, Regression and path Analysis. The major findings are summarized as follows; 1) The level of Consumer's prior knowledge showed somewhat middle. 2) Degree of importance of products showed in order of quality, A/S extension exchange price reliance of a manufacturing company a design etc. 3) Information search for the consumer's prior knowledge and importance showed high on the whole. The more prior knowledge consumer have the better they recognize for the importance of products. Therefore consumers are more likely to search information.

  • PDF

GPU-based Monte Carlo Photon Migration Algorithm with Path-partition Load Balancing

  • Jeon, Youngjin;Park, Jongha;Hahn, Joonku;Kim, Hwi
    • Current Optics and Photonics
    • /
    • v.5 no.6
    • /
    • pp.617-626
    • /
    • 2021
  • A parallel Monte Carlo photon migration algorithm for graphics processing units that implements an improved load-balancing strategy is presented. Conventional parallel Monte Carlo photon migration algorithms suffer from a computational bottleneck due to their reliance on a simple load-balancing strategy that does not take into account the different length of the mean free paths of the photons. In this paper, path-partition load balancing is proposed to eliminate this computational bottleneck based on a mathematical formula that parallelizes the photon path tracing process, which has previously been considered non-parallelizable. The performance of the proposed algorithm is tested using three-dimensional photon migration simulations of a human skin model.

Effects of Information Security Education on the Practice of Information Security for the Youth (정보보호 교육이 청소년의 정보보호 실천에 미치는 영향)

  • Kang, Min-Seong;Kim, Tae-Sung;Kim, Taek-Young
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.2
    • /
    • pp.27-40
    • /
    • 2019
  • As reliance on information and communication becomes widespread, a variety of information dysfunctions such as hacking, viruses, and the infringement of personal information are also occurring. Korean adolescents are especially exposed to an environment in which they are experiencing information dysfunction. In addition, youth cybercrimes are steadily occurring. To prevent cybercrime and the damage caused by information dysfunction, information security practices are essential. Accordingly, the purpose of this study is to discuss the factors affecting the information security practices of Korean youths, considering information security education, perceived severity, and perceived vulnerability as leading factors of the theory of planned behavior. A questionnaire survey was administered to 118 middle and high school students. Results of the hypothesis test show that information security education affects perceived behavior control, and perceived severity affects attitude. Subjective norms, information security attitudes, and perceived behavioral control were found to influence adolescents' practices of information security. However, perceived vulnerabilities did not affect youths' information security attitudes. This study confirms that information security education can help youths to practice information security. In other words, information security education is important, and it is a necessary element in the information curriculum of contemporary youth. However, perceived vulnerability to youth information security threats did not affect information security attitudes. Consequently, we suggest that it is necessary to strengthen the contents of the information security education for Korean youths.

Survey on the Authentication and Key Management of 802.11s

  • Lam, Jun Huy;Lee, Sang-Gon;Tan, Whye Kit
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.89-92
    • /
    • 2012
  • Wireless Mesh Network expanded the capability of the conventional wireless networking by allowing the nodes to operate in proactive mode, reactive mode or the combination of both, the hybrid mode in the multi-hopping nature. By doing so, the links between the nodes become much more robust and reliable because of the number of paths to reach a destination node from a source node can be more than 1 and do not need to rely on the access point (AP) alone to relay the messages. As there may be many possible ways to form an end-to-end link between 2 nodes, the routing security becomes another main concern of the 802.11s protocol. Besides its reliance on the 802.11i for the security measures, 802.11s also includes some new features such as the Mesh Temporal Key (MTK) and the Simultaneous Authentication of Equals (SAE). The authentication and key management (AKM) process of 802.11s were observed in this paper.

  • PDF

Development of a New Instrument to Measuring Concerns for Corporate Information Privacy Management (국내 기업개인정보보호 측정항목과 관리모형 개발에 관한 연구)

  • Lee, Sung-Joong;Lee, Young-Jai
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.4
    • /
    • pp.79-92
    • /
    • 2009
  • With the rising reliance on market estimation through customer analysis in customer-centered marketing, there is a rapid increase in the amount of personal data owned by corporations. There has been a corresponding rise in the customers' interest in personal information protection, and the problem of personal information leakage has risen as a serious issue. The purpose of this research is to develop a diagnosis model for personal information protection that is suited to our country's corporate environment, and on this basis, to present diagnostic instruments that can be applied to domestic corporations. This diagnosis model is a structural equation model that schematizes the degree of synthetic effect that administration factors and estimation items have on the protection of personal information owned by corporations. We develop the model- consisting of the administration factors for personal information protection and the measurement items of each factor- using the development method of standardized structural equation model. We then present a tool through which the administration factors and estimation items verified through this model can be used in the diagnosis for personal information protection in corporations. This diagnostic tool can be utilized as a useful instrument to prevent in advance the leakage of personal information in corporations.

  • PDF

A Study on Relationships Between Information Systems Risk and Password Characteristics (정보 시스템 위험과 패스워드 특성간의 관계에 대한 연구)

  • 오창규;김종기;심윤주
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.62-74
    • /
    • 2003
  • Information security becomes a critical attribute to corporate information systems as increased strategic an operational reliance on information systems. Current proliferation of password requires more attention on information security because its nature of external connection with password user makes information systems more vulnerable from various threats are an important element of information systems management. This study focused on two issues : (1) the relationships between risk management factors(asset, threat, vulnerability) and risk level affected by threat, (2) the relationships between risk level and key password characteristics(length, composition, lifetime, selection method).

  • PDF

Adversarial Complementary Learning for Just Noticeable Difference Estimation

  • Dong Yu;Jian Jin;Lili Meng;Zhipeng Chen;Huaxiang Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.2
    • /
    • pp.438-455
    • /
    • 2024
  • Recently, many unsupervised learning-based models have emerged for Just Noticeable Difference (JND) estimation, demonstrating remarkable improvements in accuracy. However, these models suffer from a significant drawback is that their heavy reliance on handcrafted priors for guidance. This restricts the information for estimating JND simply extracted from regions that are highly related to handcrafted priors, while information from the rest of the regions is disregarded, thus limiting the accuracy of JND estimation. To address such issue, on the one hand, we extract the information for estimating JND in an Adversarial Complementary Learning (ACoL) way and propose an ACoL-JND network to estimate the JND by comprehensively considering the handcrafted priors-related regions and non-related regions. On the other hand, to make the handcrafted priors richer, we take two additional priors that are highly related to JND modeling into account, i.e., Patterned Masking (PM) and Contrast Masking (CM). Experimental results demonstrate that our proposed model outperforms the existing JND models and achieves state-of-the-art performance in both subjective viewing tests and objective metrics assessments.

A Study on Distributed Self-Reliance Wireless Sensing Mechanism for Supporting Data Transmission over Heterogeneous Wireless Networks

  • Caytiles, Ronnie D.;Park, Byungjoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.32-38
    • /
    • 2020
  • The deployment of geographically distributed wireless sensors has greatly elevated the capability of monitoring structural health in social-overhead capital (SOC) public infrastructures. This paper deals with the utilization of a distributed mobility management (DMM) approach for the deployment of wireless sensing devices in a structural health monitoring system (SHM). Then, a wireless sensing mechanism utilizing low-energy adaptive clustering hierarchy (LEACH)-based clustering algorithm for smart sensors has been analyzed to support the seamless data transmission of structural health information which is essentially important to guarantee public safety. The clustering of smart sensors will be able to provide real-time monitoring of structural health and a filtering algorithm to boost the transmission of critical information over heterogeneous wireless and mobile networks.

Use of the estimated critical values adapting a regression equation for the approximate entropy test

  • Cha, Kyung-Joon;Ryu, Je-Seon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.13 no.2
    • /
    • pp.77-85
    • /
    • 2002
  • The statistical testing methods have been widely recognized to determine the plain and cipher texts. In fact, the randomness for a sequence from an encryption algorithm is necessary to guarantee security and reliance of cipher algorithm. Thus, the statistical randomness tests are used to discover cipher text. In this paper, we would provide the critical value for an approximate entropy test by estimating the nonlinear regression equation when the number of sequence and the level of significance are given. Thus, we can discern plan and cipher text for real problem with given number of sequence and the level of significance. Also, we confirm the fitness of the estimated critical values from the rate of success for plain or cipher text.

  • PDF

An Empirical Study for the Expert's Reliance on the Knowledge from the Several Data Mining Techniques (여러가지 Data Mining 기법으로부터 도출된 지식에 관한 전문가의 신뢰도에 대한 실증적 연구)

  • Kim, Gwang Yong
    • Journal of Intelligence and Information Systems
    • /
    • v.5 no.1
    • /
    • pp.123-123
    • /
    • 1999
  • 본 연구는 여러 가지 데이터마이닝 기법으로부터 도출된 지식이 어떻게 인간의 판단에 영향을 미치는 가를 지식구조별, 자료특성별, 전문가지식의 일관성별로 실증적 연구를 하여 궁극적으로 전문가 의사결정에 도움이 되는 데이터마이닝 기법의 활용방안을 제시하고자 한다. 분석결과 전문가들의 판단은 데이터마이닝의 지식표현형태에 의한 영향을 많이 받고 있는 것으로 나타났으며, 특히 IF-THEN의 형태로 표현되는 명제형 지식구조에 가장 많은 신뢰를 갖는 것으로 나타났다. 특히 자료의 특성, 또는 전문가의 판단 일관성과 데이터마이닝 기법 사이에 상호작용효과가 있어 향후 데이터마이닝 기법을 활용하여 전문가의 의사결정을 돕고자 할 때는 이러한 차이점을 고려해야 하는 것으로 밝혀졌다.