• Title/Summary/Keyword: Opinion Network

Search Result 236, Processing Time 0.023 seconds

A development of weakness calculation method for information system (정보시스템 취약도 계산 방법 개발)

  • Park, Joong-Gil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.131-139
    • /
    • 2007
  • Vulnerability analysis helps to remove discriminating vulnerabilities that exist in various equipment that composes operating information system. It is possible to explain representation and exclusion method about vulnerabilities of each equipment by vulnerability analysis. But it is difficult to display the weakness of whole information system. To do this, analyst synthesizes several information that achieved by vulnerability analysis. But the existing method does not provide fair evaluation because operators' personal opinion. In this paper, we explain about method that unites discriminatively vulnerable point and expresses whole weakness degree in numerical value by equipment, by system class, or by overall system.

Feasibility to Expand Complex Wards for Efficient Hospital Management and Quality Improvement

  • CHOI, Eun-Mee;JUNG, Yong-Sik;KWON, Lee-Seung;KO, Sang-Kyun;LEE, Jae-Young;KIM, Myeong-Jong
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.12
    • /
    • pp.7-15
    • /
    • 2020
  • Purpose: This study aims to explore the feasibility of expanding complex wards to provide efficient hospital management and high-quality medical services to local residents of Gangneung Medical Center (GMC). Research Design, Data and Methodology: There are four research designs to achieve the research objectives. We analyzed Big Data for 3 months on Social Network Services (SNS). A questionnaire survey conducted on 219 patients visiting the GMC. Surveys of 20 employees of the GMC applied. The feasibility to expand the GMC ward measured through Focus Group Interview by 12 internal and external experts. Data analysis methods derived from various surveys applied with data mining technique, frequency analysis, and Importance-Performance Analysis methods, and IBM SPSS statistical package program applied for data processing. Results: In the result of the big data analysis, the GMC's recognition on SNS is high. 95.9% of the residents and 100.0% of the employees required the need for the complex ward extension. In the analysis of expert opinion, in the future functions of GMC, specialized care (△3.3) and public medicine (△1.4) increased significantly. Conclusion: GMC's complex ward extension is an urgent and indispensable project to provide efficient hospital management and service quality.

A Case Study on the Internal and External Use of Information Sharing Network: A Qualitative Approach (정보공유 네트워크의 조직 내외부 활용에 관한 사례 연구: 질적 연구를 바탕으로)

  • Kim, Jonghyuk;Kim, Suk-Chul
    • International Commerce and Information Review
    • /
    • v.18 no.3
    • /
    • pp.205-226
    • /
    • 2016
  • As knowledge workers have increased and information interchanges become more diverse, only the resources of internal enterprise is not longer useful, and the practical use of external information through information public sharing network is even more crucial. But, few studies that use both internal and external information sharing systems together have been conducted. In this research, we carried on the depth interview to analyze the main factors that intend to utilize outside information as well as to share inside information voluntarily. In conclusion, sharing internal information is directly involved with the performance of their job exchanging simple data, past documents, and technical materials. On the other hand, using the external information belonged to several other organizations is mostly caused by the voluntary participants' satisfaction sharing their individual experience through the network systems. Based on the study, we propose the idea that can activate both internal and external information sharing network through the system with user feedback function regarding the customized information, and with the space expansion where people can freely raise their private opinion. We also introduce the plan of the construction of communication systems with various experts, and the development of compatible devices with diverse interfaces.

  • PDF

Cluster and Polarity Analysis of Online Discussion Communities Using User Bipartite Graph Model (사용자 이분그래프모형을 이용한 온라인 커뮤니티 토론 네트워크의 군집성과 극성 분석)

  • Kim, Sung-Hwan;Tak, Haesung;Cho, Hwan-Gue
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.89-96
    • /
    • 2018
  • In online communities, a large number of participants can exchange their opinion using replies without time and space restrictions. While the online space provides quick and free communication, it also easily triggers unnecessary quarrels and conflicts. The network established on the discussion participants is an important cue to analyze the confrontation and predict serious disputes. In this paper, we present a quantitative measure for polarity observed on the discussion network built from reply exchanges in online communities. The proposed method uses the comment exchange information to establish the user interaction network graph, computes its maximum spanning tree, and then performs vertex coloring to assign two colors to each node in order to divide the discussion participants into two subsets. Using the proportion of the comment exchanges across the partitioned user subsets, we compute the polarity measure, and quantify how discussion participants are bipolarized. Using experimental results, we demonstrate the effectiveness of our method for detecting polarization and show participants of a specific discussion subject tend to be divided into two camps when they debate.

Extraction of System-Wide Sybil-Resistant Trust Value embedded in Online Social Network Graph (온라인 소셜 네트워크 그래프에 내포된 시스템-차원 시빌-저항 신뢰도 추출)

  • Kim, Kyungbaek
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.533-540
    • /
    • 2013
  • Anonymity is the one of main reasons for substantial improvement of Internet. It encourages various users to express their opinion freely and helps Internet based distributed systems vitalize. But, anonymity can cause unexpected threats because personal information of an online user is hidden. Especially, distributed systems are threatened by Sybil attack, where one malicious user creates and manages multiple fake online identities. To prevent Sybil attack, the traditional solutions include increasing the complexity of identity generation and mapping online identities to real-world identities. But, even though the high complexity of identity generation increases the generation cost of Sybil identities, eventually they are generated and there is no further way to suppress their activity. Also, the mapping between online identities and real identities may cause high possibility of losing anonymity. Recently, some methods using online social network to prevent Sybil attack are researched. In this paper, a new method is proposed for extracting a user's system-wide Sybil-resistant trust value by using the properties embedded in online social network graphs. The proposed method can be categorized into 3 types based on sampling and decision strategies. By using graphs sampled from Facebook, the performance of the 3 types of the proposed method is evaluated. Moreover, the impact of Sybil attack on nodes with different characteristics is evaluated in order to understand the behavior of Sybil attack.

Analysis of Descriptive Course Evaluation of University Chemistry Laboratory Class using Text Mining (텍스트 마이닝을 활용한 대학 화학 실험 수업의 서술형 강의 평가 내용 분석)

  • Yun, Jeonghyun;Park, Geumju
    • Journal of the Korean Chemical Society
    • /
    • v.66 no.3
    • /
    • pp.218-227
    • /
    • 2022
  • The purpose of this study is to analyze the opinions of students by using the text mining to the good points and improvements among the descriptive course evaluation written by the students who participated in the university chemistry laboratory class, and to derive the improvement for the class. We analyzed the frequency of occurrence, co-occurrence and network of key words. As a result of the study, in the network of good points in the class, the most frequent mentions were made between class and professor, along with explanation, understanding, student, passion, fun, TA, experiment, help, etc. In the network of improvements in the class, the most frequent mentions were made between class and student, along with professor, content, explanation, exam, wish, experiment, understanding, difficult, thought, problem, etc. In other words, the students suggested the opinion that the contents of the class were well understood and that they felt fun and satisfied with the experimental process due to 'easy and detailed explanation' and 'TA's assistance' as good points of the class. On the other hand, the students suggested the negative opinions that the understanding and concentration in the class was decreased due to 'difficulty of content and exam', 'excessive assignments', and 'class environment' as improvements of the class.

The Impact of Changes in Social Information Processing Mechanism on Social Consensus Making in the Information Society (정보화사회에 있어서 사회적 정보처리 메커니즘의 변화가 사회적 컨센서스 형성에 미치는 영향에 대한 연구)

  • Jin, Seung-Hye;Kim, Yong-Jin
    • Information Systems Review
    • /
    • v.13 no.3
    • /
    • pp.141-163
    • /
    • 2011
  • The advancement of information technologies including the Internet has affected the way of social information processing as well as brought about the paradigm shift to the information society. Accordingly, it is very important to study the process of social information processing over the digital media through which social information is generated, distributed, and led to social consensus. In this study, we analyze the mechanism of social information processing, identify a process model of social consensus and institutionalization of the results, and finally propose a set of information processing characteristics on the internet media. We deploy the ethnographic approach to analyze the meaning of group behavior in the context of society to analyze two major events which happened in Korean society. The formation process of social consensus is found to consist of 5 steps: suggestion of social issues, selective reflection on public opinion, acceptance of the issues and diffusion, social consensus, and institutionalization and feedback. The key characteristics of information processing in the Internet is grouped into proactive response to an event, the changes in the role of opinion leader, the flexibility of proposal and analysis, greater scalability, relevance to consensus making, institutionalization and interaction. This study contributes to the literature by proposing a process model of social information processing which can be used as the basis for analyzing the social consensus making process from the social network perspective. In addition, this study suggests a new perspective where the utility of the Internet media can be understood from the social information processing so that other disciplines including politics, communications, and management can improve the decision making performance in utilizing the Internet media.

A Study on the Current Status and Future Prospection of the Electronic Payment Infrastructure -Focusing on the e-L/C and SWIFT TSU- (전자결제 인프라 현황과 향후 전망 -전자신용장과 SWIFT TSU를 중심으로-)

  • Kim, Tae-Hwan
    • International Commerce and Information Review
    • /
    • v.14 no.3
    • /
    • pp.585-610
    • /
    • 2012
  • There have been various attempt to offer commercial service of electronic payment. Actually, however, there has been few electronic payment model that are being used commercial service. Among them, it is estimated that only TSU(Trade Service Utility) of SWIFT will be succeed in providing commercial service possibility. In Korea e-L/C Distribution & Management System was constructed and become the first e-L/C service on a global basis via e-Trade Facilitation 3 Years Project and then started offering the world first e-L/C service. Some scholars have insisted the opinion that SWIFT L/C means e-L/C, but such opinion may be wrong because SWIFT L/C means the L/C advised by SWIFT(Society for Worldwid Interbank Financial Telecommunication) under the condition that a series of procedure from the issuance of L/C to the advice is done by SWIFT system. Because perfect e-L/C should be organically connected by SWIFT network and also, the e-L/C business between overseas banks and their customers should be organically linked with each other. The purpose of this paper is contribute to the commercialization of e-L/C distribution system by studying the current status of infrastructure concerned with domestic and overseas electronic payment and future e-payment infrastructure, seeking to be introduced internationally by doing things.

  • PDF

Analysis of Perception on Happy Housing Using Blog Mining Technique (블로그 마이닝을 활용한 행복주택의 인식 분석)

  • Hwang, Ji Hyoun
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.2
    • /
    • pp.211-223
    • /
    • 2022
  • This study aims to verify the possibility of using the blog mining to collect public opinion in the field of housing policy, thus, it collected blog posts with the keyword 'Happy Housing', extracted the main keywords from them, and analyzed the public's perception through keyword and word cluster analysis. 137,002 blog posts were used as analysis data from May 2013, when social discussion about happy housing spread, to August 2021, and the words derived by dividing the period into three stages in consideration of major housing policies and data collection were analyzed. The results are as follows. In the keyword analysis, overall, the importance of words related to the location, the number, the size, and the conditions for occupancy of Happy Housing is high. In the first stage, government policy implementation, in the second stage, the application process for Happy Housing, and in the third stage, recruitment notices, occupancy qualifications, and rental conditions are found to be highly important. In cluster analysis, project progress, application process, and project area were drawn as main themes at all stages. In particular, policy implementation and implementation plan in the first stage, occupancy qualification and financial support in the second stage, and policy implementation and occupancy qualification in the third stage were drawn as main themes. These results present the possibility of the blog mining as a method of collecting public opinion by sharing policy-related information, reflecting social issues, evaluating whether policies are delivered, and inferring the public's participation in policies.

A Study on Artificial Intelligence Ethics Perceptions of University Students by Text Mining (텍스트 마이닝으로 살펴본 대학생들의 인공지능 윤리 인식 연구)

  • Yoo, Sujin;Jang, YunJae
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.6
    • /
    • pp.947-960
    • /
    • 2021
  • In this study, we examine the AI ethics perception of university students to explore the direction of AI ethics education. For this, 83 students wrote their thoughts about 5 discussion topics on online bulletin board. We analyzed it using language networks, one of the text mining techniques. As a result, 62.5% of students spoke the future of the AI society positively. Second, if there is a self-driving car accident, 39.2% of students thought it is the vehicle owner's responsibility at the current level of autonomous driving. Third, invasion of privacy, abuse of technology, and unbalanced information acquisition were cited as dysfunctions of the development of AI. It was mentioned that ethical education for both AI users and developers is required as a way to minimize malfunctions, and institutional preparations should be carried out in parallel. Fourth, only 19.2% of students showed a positive opinion about a society where face recognition technology is universal. Finally, there was a common opinion that when collecting data including personal information, only the part with the consent should be used. Regarding the use of AI without moral standards, they emphasized the ethical literacy of both users and developers. This study is meaningful in that it provides information necessary to design the contents of artificial intelligence ethics education in liberal arts education.