• Title/Summary/Keyword: Knowledge-based systems

Search Result 2,129, Processing Time 0.026 seconds

An Longitudinal Analysis of Changing Beliefs on the Use in IT Educatee by Elaboration Likelihood Model (정교화 가능성 모형에 의한 IT 피교육자 신용 믿음 변화의 종단분석)

  • Lee, Woong-Kyu
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.147-165
    • /
    • 2008
  • IT education can be summarized as persuading the educatee to accept IT. The persuasion is made by delivering the messages for how-to-use and where-to-use to the educatee, which leads formulation of a belief structure for using IT. Therefore, message based persuasion theory, as well as IT acceptance theories such as technology acceptance model(TAM), would play a very important role for explaining IT education. According to elaboration likelihood model(ELM) that has been considered as one of the most influential persuasion theories, people change attitude or perception by two routes, central route and peripheral route. In central route, people would think critically about issue-related arguments in an informational message. In peripheral route, subjects rely on cues regarding the target behavior with less cognitive efforts. Moreover, such persuasion process is not a one-shot program but continuous repetition with feedbacks, which leads to changing a belief structure for using IT. An educatee would get more knowledge and experiences of using IT as following an education program, and be more dependent on a central route than a peripheral route. Such change would reformulate a belief structure which is different from the intial one. The objectives of this study are the following two: First, an identification of the relationship between ELM and belief structures for using IT. Especially, we analyze the effects of message interpretation through both of central and peripheral routes on perceived usefulness which is an important explaining variable in TAM and perceived use control which have perceived ease of use and perceived controllability as sub-dimensions. Second, a longitudinal analysis of the above effects. In other words, change of the relationship between interpretation of message delivered by IT education and beliefs of IT using is analyzed longitudinally. For achievement of our objectives, we suggest a research model, which is constructed as three-layered. While first layer has a dependent variable, use intention, second one has perceived usefulness and perceived use control that has two sub-concepts, perceived ease of use and perceived controllability. Finally, third one is related with two routes in ELM, source credibility and argument quality which are operationalization of peripheral route and central route respectively. By these variables, we suggest five hypotheses. In addition to relationship among variables, we suggest two additional hypotheses, moderation effects of time in the relationships between perceived usefulness and two routes. That is, source credibility's influence on perceived usefulness is decreased as time flows, and argument quality's influence is increased. For validation of it, our research model is tested empirically. With measurements which have been validated in the other studies, we survey students in an Excel class two times for longitudinal analysis. Data Analysis is done by partial least square(PLS), which is known as an appropriate approach for multi-group comparison analysis with a small sized sample as like this study. In result. all hypotheses are statistically supported. One of theoretical contributions in this study is an analysis of IT education based on ELM and TAM which are considered as important theories in psychology and IS theories respectively. A longitudinal analysis by comparison between two surveys based on PLS is also considered as a methodological contribution. In practice, finding the importance of peripheral route in early stage of IT education should be notable.

The Establishment and Design of the Science Class in Cyber Space (사이버과학교실시스템 설계 및 구현)

  • Kim, Mi-Young;Kweon, Hyo-Soon;Park, Hye-Ock
    • Journal of Engineering Education Research
    • /
    • v.9 no.4
    • /
    • pp.28-45
    • /
    • 2006
  • As society has changed to being more knowledge-based, it is indispensable that Internet usage is incorporated into education. Therefore, the e-learning system is being developed in order to provide a proper environment. However, many LCMS that were developed, currently are not based on SCORM, the world e-learning standard, nor KEM, the Korea Educational Metadata of Korea Education & Research Information Service(KERIS), and hence, it is difficult to share learning contents developed from such varied environments. National Science Museum, a non-educational institution, also provides the educational science exhibits in reality or in cyber space, which cannot be produced by elementary schools, and secondary schools. Consequently, new systems are necessary, whose modules should be divided into four, for example, 'teachers', 'learners', 'managers', and 'instructors', and be associated with each other so that they are able to integrate and manage such systems, and be used in school education as well. Therefore, in this study, more advanced LMS and LCMS, which are the web-portal sites used for a cyber science class at the National Science Museum, were designed and established. These sites were surely based on the KEM, and the SCORM.

An Ontology-Based Method for Calculating the Difficulty of a Learning Content (온톨로지 기반 학습 콘텐츠의 난이도 계산 방법)

  • Park, Jae-Wook;Park, Mee-Hwa;Lee, Yong-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.83-91
    • /
    • 2011
  • Much research has been conducted on the e-learning systems for recommending a learning content to a student based on the difficulty of it. The difficulty is one of the most important factors for selecting a learning content. In the existing learning content recommendation systems, the difficulty of a learning content is determined by the creator. Therefore, it is not easy to apply a standard rule to the difficulty as it is determined by a subjective method. In this paper, we propose an ontology-based method for determining the difficulty of a learning content in order to provide an objective measurement. Previously, ontologies and knowledge maps have been used to recommend a learning content. However, their methods have the same problem because the difficulty is also determined by the creator. In this research, we use an ontology representing the IS-A relationships between words. The difficulty of a learning content is the sum of the weighted path lengths of the words in the learning content. By using this kind of difficulty, we can provide an objective measurement and recommend the proper learning content most suitable for the student's current level.

An Overview for Molecular Markers in Plants (식물에서 분자 마커의 동향)

  • Huh, Man Kyu
    • Journal of Life Science
    • /
    • v.25 no.7
    • /
    • pp.839-848
    • /
    • 2015
  • A molecular marker is a molecule contained within a sample taken from an organism or other matter. The development of molecular techniques for genetic analysis has led to a great contribution to our knowledge of plant genetics and our understanding of the structure and behavior of various genomes in plants. Recently, functional molecular markers have been developed to detect the presence of major genes from the analysis of pedigreed data in absence of molecular information. DNA markers have developed into many systems based on different polymorphism-detecting techniques or methods such as RFLP, AFLP, RAPD, SSR, SNP, etc. A new class of very useful DNA markers called genic molecular markers utilizing the ever-increasing archives of gene sequence information being accumulated under the EST sequencing projects on a large number of plant species. Functional markers are derived from polymorphic sequences, and are more likely to be involved in phenotypic trait variation. Based on this conceptual framework, the marker systems discussed below are all (gene)-targeted markers, which have the potential to become functional. These markers being part of the cDNA/EST-sequences, are expected to represent the functional component of the genome i.e., gene(s), in contrast to all other random DNA based markers that are developed/generated from the anonymous genomic DNA sequences/domains irrespective of their genic content/information. Especially I sited Poczai et al’ reviews, advances in plant gene-targeted and functional markers. Their reviews may be some useful information to study molecular markers in plants.

Impact of Ensemble Member Size on Confidence-based Selection in Bankruptcy Prediction (부도예측을 위한 확신 기반의 선택 접근법에서 앙상블 멤버 사이즈의 영향에 관한 연구)

  • Kim, Na-Ra;Shin, Kyung-Shik;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.55-71
    • /
    • 2013
  • The prediction model is the main factor affecting the performance of a knowledge-based system for bankruptcy prediction. Earlier studies on prediction modeling have focused on the building of a single best model using statistical and artificial intelligence techniques. However, since the mid-1980s, integration of multiple techniques (hybrid techniques) and, by extension, combinations of the outputs of several models (ensemble techniques) have, according to the experimental results, generally outperformed individual models. An ensemble is a technique that constructs a set of multiple models, combines their outputs, and produces one final prediction. The way in which the outputs of ensemble members are combined is one of the important issues affecting prediction accuracy. A variety of combination schemes have been proposed in order to improve prediction performance in ensembles. Each combination scheme has advantages and limitations, and can be influenced by domain and circumstance. Accordingly, decisions on the most appropriate combination scheme in a given domain and contingency are very difficult. This paper proposes a confidence-based selection approach as part of an ensemble bankruptcy-prediction scheme that can measure unified confidence, even if ensemble members produce different types of continuous-valued outputs. The present experimental results show that when varying the number of models to combine, according to the creation type of ensemble members, the proposed combination method offers the best performance in the ensemble having the largest number of models, even when compared with the methods most often employed in bankruptcy prediction.

An Empirical Investigation into the Role of Core-Competency Orientation and IT Outsourcing Process Management Capability (핵심역량 지향성과 프로세스 관리역량이 IT 아웃소싱 성과에 미치는 연구)

  • Kim, Yong-Jin;Nam, Ki-Chan;Song, Jae-Ki;Koo, Chul-Mo
    • Asia pacific journal of information systems
    • /
    • v.17 no.3
    • /
    • pp.131-146
    • /
    • 2007
  • Recently, the role of IT service providers has been enlarged from managing a single function or system to reconstructing entire information management processes in new ways to contribute to shareholder value across the enterprise. This movement toward extensive and complex outsourcing agreements has been driven by the assumption that outsourcing information technology functions is a reliable approach to maximizing resource productivity. Hiring external IT service providers to manage part or all of its information-related services helps a firm focus on its core business and provides better services to its clients, thus obtaining sustainable competitive advantage. This practice of focusing on the strategic aspect of outsourcing is referred to as strategic sourcing where the focus is capability sourcing, not procurement. Given the importance of the strategic outsourcing, however, to our knowledge, there is little empirical research on the relationship between the strategic outsourcing orientation and outsourcing performance. Moreover, there is little research on the factor that makes the strategic outsourcing effective. This study is designed to investigate the relationship between strategic IT outsourcing orientation and IT outsourcing performance and the process through which strategic IT outsourcing orientation influences outsourcing performance, Based on the framework of strategic orientation-performance and core competence based management, this study first identifies core competency orientation as a proper strategic orientation pertinent to IT outsourcing and IT outsourcing process management capability as the mediator to affect IT outsourcing performance. The proposed research model is then tested with a sample of 200 firms. The findings of this study may contribute to the literature in two ways. First, it draws on the strategic orientation - performance framework in developing its research model so that it can provide a new perspective to the well studied phenomena. This perspective allows practitioners and researchers to look at outsourcing from an angle that emphasizes the strategic decision making to outsource its IT functions. Second, by separating the concept of strategic orientation and outsourcing process management capability, this study provides practices with insight into how the strategic orientation can work effectively to achieve an expected result. In addition, the current study provides a basis for future studies that examine the factors affecting IT outsourcing performance with more controllable factors such as IT outsourcing process management capability rather than external hard-to-control factors including trust and relationship management. This study investigates the major factors that determine IT outsourcing success. Based on strategic orientation and core competency theories, we develop the proposed research model to investigate the relationship between core competency orientation and IT outsourcing performance and the mediating role of IT outsourcing process management capability on IT outsourcing performance. The model consists of two independent variables (core-competency-orientation and IT outsourcing process management capability), and two dependent variables (outsourced task complexity and IT outsourcing performance). Comprehensive data collection was conducted through an outsourcing association. The survey data were analyzed using a structural analysis method. IT outsourcing process management capability was found to mediate the effect of core competency orientation on both outsourced task complexity and IT outsourcing performance. Further analysis and findings are discussed.

A Study on Development of Measurement Tools for Word-of-Mouth Constraint Factors - Focusing on SNS Advertising - (구전 제약요인 측정도구 개발에 대한 연구 - SNS 광고를 중심으로 -)

  • Yun, Dae-Hong
    • Management & Information Systems Review
    • /
    • v.38 no.2
    • /
    • pp.209-223
    • /
    • 2019
  • The purpose of this study was to stimulate the online word-of-mouth advertising by developing the concept of word-of-mouth constraint factors and measurement tools in connection with the SNS advertising on social networks. To achieve the objective of this study, this study was conducted in 3 phases. First, the exploratory investigation(target group interview, in-depth interview, and expert interview) was performed to determine the concept and scope of the word-of-mouth constraint based on literature study and qualitative investigation method. Second, the reliability and validity of the measurement questions were verified through the survey in order to refine the developed measurement items. Third, the predictive validity of measurement items was verified by examining the relationship with other major construct concept for which the developed measurement items were different. Based on the results of study, 6 components and a total of 23 measurement questions for those components were derived. Each was called intrapersonal and interpersonal constraint(psychological sensitivity, compensatory sensitivity, and other person assessment), structural constraint(reliability, informativity, and entertainment). We developed the measurement questions related to word-of-mouth constraint based on qualitative study and quantitative study and holistically examined the social and psychological, environmental interruption factors acting as the word-of-mouth constraint factors for SNS advertising in terms of SNS achievements and evaluation from the perspective of word-of-mouth constraint. The results will lead to creation of basic framework for systematic and empirical research on the online word-of-mouth constraint and to achievement of effective SNS word-of-mouth advertising.

Rule-base Expert System for Privacy Violation Certainty Estimation (개인정보유출 확신도 도출을 위한 전문가시스템개발)

  • Kim, Jin-Hyung;Lee, Alexander;Kim, Hyung-Jong;Hwang, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.125-135
    • /
    • 2009
  • Logs from various security system can reveal the attack trials for accessing private data without authorization. The logs can be a kind of confidence deriving factors that a certain IP address is involved in the trial. This paper presents a rule-based expert system for derivation of privacy violation confidence using various security systems. Generally, security manager analyzes and synthesizes the log information from various security systems about a certain IP address to find the relevance with privacy violation cases. The security managers' knowledge handling various log information can be transformed into rules for automation of the log analysis and synthesis. Especially, the coverage of log analysis for personal information leakage is not too broad when we compare with the analysis of various intrusion trials. Thus, the number of rules that we should author is relatively small. In this paper, we have derived correlation among logs from IDS, Firewall and Webserver in the view point of privacy protection and implemented a rule-based expert system based on the derived correlation. Consequently, we defined a method for calculating the score which represents the relevance between IP address and privacy violation. The UI(User Interface) expert system has a capability of managing the rule set such as insertion, deletion and update.

An Interactive Approach to Categorize Questions on the Internet BBSs (인터넷 게시판 질문 분류를 위한 인터랙티브 접근방법에 관한 연구)

  • Jae-Kwang Lee;Seong-Ho Noh;Ok-Hyun Ryou
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.3
    • /
    • pp.177-195
    • /
    • 2003
  • In a traditional customer support environment, mainly call centers or service centers are responsible for receiving inquiries from their customers via telephone calls. Due to the rapid growth of Internet with its widespread acceptance and accessibility, means of communication with customers in the traditional customer support center, such as telephones, letters, and direct-visiting, have been replaced by e-mails and bulletin board systems (BBSs) using the Internet constantly. BBSs are basically question and answer systems, they require some lead time to get answer from administrator. To reduce lead time, BBSs enable remote customers or users to log on and tap into a knowledge database that is generally formatted in the form of Frequently Asked Questions (FAQs) that provide answers and solutions to the common problems. And, many different types of the questions are mixed on the BBS. It is a burden to administrator. To build FAQs and to support BBS adminstrator, a supporting tool which is to categorize questions is helpful. In this research, we suggest an interactive question categorizing methodology which consists of steps to present question using keywords, identifying keywords' affinity, computing similarity among questions, and clustering questions. This methodology allows users to interact iteratively for clear manifestation of ambiguous questions. We also developed a prototype system, IQC (interactive question categorizer) and evaluated its performance using the comparison experiments with other systems. IQC is not a general purposed system, but it produces a good result in a given specific domain.

  • PDF

Comparisons of Popularity- and Expert-Based News Recommendations: Similarities and Importance (인기도 기반의 온라인 추천 뉴스 기사와 전문 편집인 기반의 지면 뉴스 기사의 유사성과 중요도 비교)

  • Suh, Kil-Soo;Lee, Seongwon;Suh, Eung-Kyo;Kang, Hyebin;Lee, Seungwon;Lee, Un-Kon
    • Asia pacific journal of information systems
    • /
    • v.24 no.2
    • /
    • pp.191-210
    • /
    • 2014
  • As mobile devices that can be connected to the Internet have spread and networking has become possible whenever/wherever, the Internet has become central in the dissemination and consumption of news. Accordingly, the ways news is gathered, disseminated, and consumed have changed greatly. In the traditional news media such as magazines and newspapers, expert editors determined what events were worthy of deploying their staffs or freelancers to cover and what stories from newswires or other sources would be printed. Furthermore, they determined how these stories would be displayed in their publications in terms of page placement, space allocation, type sizes, photographs, and other graphic elements. In turn, readers-news consumers-judged the importance of news not only by its subject and content, but also through subsidiary information such as its location and how it was displayed. Their judgments reflected their acceptance of an assumption that these expert editors had the knowledge and ability not only to serve as gatekeepers in determining what news was valuable and important but also how to rank its value and importance. As such, news assembled, dispensed, and consumed in this manner can be said to be expert-based recommended news. However, in the era of Internet news, the role of expert editors as gatekeepers has been greatly diminished. Many Internet news sites offer a huge volume of news on diverse topics from many media companies, thereby eliminating in many cases the gatekeeper role of expert editors. One result has been to turn news users from passive receptacles into activists who search for news that reflects their interests or tastes. To solve the problem of an overload of information and enhance the efficiency of news users' searches, Internet news sites have introduced numerous recommendation techniques. Recommendations based on popularity constitute one of the most frequently used of these techniques. This popularity-based approach shows a list of those news items that have been read and shared by many people, based on users' behavior such as clicks, evaluations, and sharing. "most-viewed list," "most-replied list," and "real-time issue" found on news sites belong to this system. Given that collective intelligence serves as the premise of these popularity-based recommendations, popularity-based news recommendations would be considered highly important because stories that have been read and shared by many people are presumably more likely to be better than those preferred by only a few people. However, these recommendations may reflect a popularity bias because stories judged likely to be more popular have been placed where they will be most noticeable. As a result, such stories are more likely to be continuously exposed and included in popularity-based recommended news lists. Popular news stories cannot be said to be necessarily those that are most important to readers. Given that many people use popularity-based recommended news and that the popularity-based recommendation approach greatly affects patterns of news use, a review of whether popularity-based news recommendations actually reflect important news can be said to be an indispensable procedure. Therefore, in this study, popularity-based news recommendations of an Internet news portal was compared with top placements of news in printed newspapers, and news users' judgments of which stories were personally and socially important were analyzed. The study was conducted in two stages. In the first stage, content analyses were used to compare the content of the popularity-based news recommendations of an Internet news site with those of the expert-based news recommendations of printed newspapers. Five days of news stories were collected. "most-viewed list" of the Naver portal site were used as the popularity-based recommendations; the expert-based recommendations were represented by the top pieces of news from five major daily newspapers-the Chosun Ilbo, the JoongAng Ilbo, the Dong-A Daily News, the Hankyoreh Shinmun, and the Kyunghyang Shinmun. In the second stage, along with the news stories collected in the first stage, some Internet news stories and some news stories from printed newspapers that the Internet and the newspapers did not have in common were randomly extracted and used in online questionnaire surveys that asked the importance of these selected news stories. According to our analysis, only 10.81% of the popularity-based news recommendations were similar in content with the expert-based news judgments. Therefore, the content of popularity-based news recommendations appears to be quite different from the content of expert-based recommendations. The differences in importance between these two groups of news stories were analyzed, and the results indicated that whereas the two groups did not differ significantly in their recommendations of stories of personal importance, the expert-based recommendations ranked higher in social importance. This study has importance for theory in its examination of popularity-based news recommendations from the two theoretical viewpoints of collective intelligence and popularity bias and by its use of both qualitative (content analysis) and quantitative methods (questionnaires). It also sheds light on the differences in the role of media channels that fulfill an agenda-setting function and Internet news sites that treat news from the viewpoint of markets.