• Title/Summary/Keyword: Research Information Systems

Search Result 12,220, Processing Time 0.037 seconds

A Study on Factors Influencing User's Security Behavioral Intention for Choosing Password (패스워드 선택을 위한 사용자의 보안행위의도에 영향을 미치는 요인)

  • Kim, Jong-Ki;Kang, Da-Yeon;Jeon, Jin-Hwan
    • The Journal of Information Systems
    • /
    • v.17 no.1
    • /
    • pp.23-43
    • /
    • 2008
  • Nowadays, openness and accessibility of information systems increase security threats from inside and outside of organization. Appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. This study emphasizes on choosing passwords from perspective of information security and investigated user's security awareness affecting behavioral intention. The research model proposed in this study includes user's security belief which is influenced by risk awareness factors such as information assets, threats and vulnerability elements. The risk awareness factors ale derived from risk analysis methodologies for information security. User's risk awareness is a factor influencing the security belief, attitude toward security behavior, and security behavioral intention. According to the result of this study, while vulnerability is not related to the risk awareness, information assets and threats are related to the user's risk awareness. There is a significant relationship between risk awareness and security belief. Also, user's security behavioral intention is significantly affected by security attitude.

A Service Discovery Scheme Based on NAPTR Resource Record (NAPTR 자원레코드 기반의 서비스 탐색기법)

  • 권성호;김희철
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.3
    • /
    • pp.69-75
    • /
    • 2003
  • NAPRT(Naming Authority Pointer) is a type of resource record specified in IETF RFC 2915. NAPTR enables to register various services in the Domain Name Systems and thus provides a way to discover services available on specific hosts. This paper describes the design and implementation of a Proxy DNS system aimed at supporting NAPTRs. The goal of this work is to study on the feasibility of the service discovery registered in DNS via NAPTR records and provides the result for simplicity and extensibility of implementation through the implementation of a actual Test-bed system This research result can be applied to service discovery in the resource information management for high performance GRE environments as well as to the implementation of DNS infrastructure for the ENUM.

  • PDF

Estimating Real-time Inundation Vulnerability Index at Point-unit Farmland Scale using Fuzzy set (Fuzzy set을 이용한 실시간 지점단위 농경지 침수위험 지수 산정)

  • Eun, Sangkyu;Kim, Taegon;Lee, Jimin;Jang, Min-Won;Suh, Kyo
    • Journal of Korean Society of Rural Planning
    • /
    • v.20 no.2
    • /
    • pp.1-10
    • /
    • 2014
  • Smartphones change the picture of data and information sharing and make it possible to share various real-time flooding data and information. The vulnerability indicators of farmland inundation is needed to calculate the risk of farmland flood based on changeable hydro-meteorological data over time with morphologic characteristics of flood-damaged areas. To find related variables show the vulnerability of farmland inundation using the binary-logit model and correlation analysis and to provide vulnerability indicators were estimated by fuzzy set method. The outputs of vulnerability indicators were compared with the results of Monte Carlo simulation (MCS) for verification. From the result vulnerability indicators are applicable to mobile_based information system of farmland inundation.

A Survey on Intrusion-Tolerant System

  • Heo, Seondong;Kim, Pyeong;Shin, Yongjoo;Lim, Jungmin;Koo, Dongyoung;Kim, Yonggon;Kwon, Ohmin;Yoon, Hyunsoo
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.4
    • /
    • pp.242-250
    • /
    • 2013
  • Many information systems that provide useful services to people are connected to the Internet for convenience and efficiency. However, improper accessibility might make the systems susceptible to a variety of attacks. Although existing security solutions such as an intrusion detection system, intrusion prevention system, and firewalls have been designed to protect against such attacks, it is impossible to block all kinds of attacks. Furthermore, most of the proposed solutions require information about attacks for efficient prevention. Research on intrusion-tolerant systems (ITSs) have been conducted in order to continue providing proper services in threatening environments. The purpose of an ITS is to survive against every intrusion, rather than to prevent them. In this paper, previous studies on ITS are introduced and classified according to the centric scheme as middleware-based ITS, hardware-based ITS, and recovery-based ITS. Recent research focusing on adaptive transformation schemes is also introduced.

A Design of Multi-Agent Framework to Develop Negotiation Systems

  • Park, Hyung-Rim;Kim, Hyun-Soo;Hong, Soon-Goo;Park, Young-Jae;Park, Yong-Sung;Kang, Moo-Hong
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.2
    • /
    • pp.155-169
    • /
    • 2003
  • A multi-agent technology has emerged as new paradigms that can flexibly and promptly cope with various environmental changes and complex problems. Accordingly, many studies have been carried out to establish multi-agent systems in an effort to solve dynamic problems in many fields. However, most previous research on the multi-agent frameworks aimed at, on the behalf of a user, exchanging and sharing information among agents, reusing agents, and suggesting job cooperation in order to integrate and assimilate heterogeneous agents. That is, their frameworks mainly focused on the basic functions of general multi-agents. Therefore, they are not suitable to the development of the proper system for a specific field such as a negotiation. The goal of this research is to design a multi-agent framework for the negotiation system that supports the evaluation of the negotiation messages, management of the negotiation messages, and message exchanges among the negotiation agents.

  • PDF

Observer System with Image Processing Method for Automation Intervention Treatment (인터벤션시술의 자동화를 위한 영상처리방법으로 구현된 관측기 시스템 (실시간 혈관조영 영상 제공방법에 관한 연구))

  • Kim, Jee-Hong;Ryu, Ji-Hyoung;Chong, Kil-To
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.4
    • /
    • pp.422-427
    • /
    • 2014
  • This study provides a method to detect blood vessels shape using image processing techniques with the help of fluoroscopy equipments, providing high precision information about vessels' location and shape of inner path. It will assist for checking and monitoring the position of operating tools during vascular interventional treatment. The blood vessels shapes are gathered with X-ray images when a fluorescent medications are injected into patient's vessel and those images are processed for getting the boundaries of vessels. Then these data are merged with real-time CT-images. These image processing systems and procedures recognize the catheter, though continued computing algorithms are very useful for observer part on the automatic control system.

The Coupling Effects of Excitatory and Inhibitory Connections Between Chaotic Neurons Having Gaussian-shaped Refractory Function With Hysteresis

  • Park, Changkyu;Lee, Ju-Jang
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1998.10a
    • /
    • pp.356-361
    • /
    • 1998
  • Neural Networks, modeled succinctly from the real nervous system of a living body, can be categorized into two folds; artificial neural network(ANN) and biological neural network(BNN). While the former has been developed to solve practical problems using function approximation capability, pattern classification) clustering algorithm, etc, the latter has been focused on verifying the information processing capability to which brain research gives an impetus, by mimicking real biological systems. However, BNN suffers Iron severe nonlinearities dealt with. A bridge between two neural networks is chaotic neural network(CNN), which simply delineate the real nor-vous system and comprises almost all the ANN structures by selecting parameters. Main research theme of this area is to develop an explanation tool to clarify the information processing mechanism in biological systems and its extension to engineering applications. The CNN has a Gaussian-shaped refractory function with hysteresis effect and the chaotic responses of it have been observed fur a wide range of parameter space. Through the examination of the coupling effects of excitatory and inhibitory connections, the secrets of information processing and memory structure will appear.

  • PDF

Factors Influencing on Behavior Intention for Mobile Commerce (모바일 커머스의 이용의도에 영향을 미치는 요인)

  • Chung, Kyung-Soo;Lee, Won-Bin
    • The Journal of Information Systems
    • /
    • v.17 no.3
    • /
    • pp.153-174
    • /
    • 2008
  • Mobile commerce is defined as any direct or indirect transaction conducted and facilitated through a wireless telecommunication network such as payment, ticketing, auction and mobile banking. Despite the importance of mobile commerce, there have not been so many academic studies on the unique characteristics of mobile commerce environments. In this study, our research model is developed based on TAM(Technology Acceptance Model) to investigate the user's technology acceptance process in mobile commerce environment. The factors, such as ubiquity, compatibility, perceived usefulness, perceived ease of use, cost, security, attitude and behavior intention for mobile commerce were selected from pier study in information systems area. The data for empirical analysis of the research model is collected online-questionnaire of 167 mobile commerce users in South Korea. The hypotheses were analyzed using SPSS 15.0 and AMOS 7.0. The results of our study show that: (1) compatibility, perceived usefulness and security had influences on the attitude whereas perceived ease of use and cost did not have any significant impact on the attitude, (2) compatibility influenced perceived usefulness whereas perceived ease of use did not, and finally (3) ubiquity, perceived usefulness and attitude had considerable influences on intention for mobile commerce. Therefore, practitioners should focus on enhancing security, quality of contents and services as well as offering what mobile commerce users want. The results of this study may useful for academicians and practitioners alike.

Intrinsic and Extrinsic Factors Impacting Individuals' Cyber Ethics Awareness and Behavior Intention (사이버윤리 준수인식과 행동의도에 영향을 미치는 사용자의 내·외적요인)

  • Kim, Sanghyun;Park, Hyunsun
    • The Journal of Information Systems
    • /
    • v.23 no.1
    • /
    • pp.111-138
    • /
    • 2014
  • As the Internet is widely used worldwide, Cyber world has become a part of daily life. On the other hand, the adverse effects of Internet, such as abusive comments, illegal harmful contents, rumor diffusion, infringement on a right have emerged with the increase. Researchers recognized the important of cyber ethics as an effective means of coping with the adverse effects on Internet. But, Little empirical research has been related to cyber ethics in management information systems. Thus, the purpose of this research is to identify multidimensional motivation factors that cyber ethics awareness and compliance behavior Intention. For this, this study investigated the factors that might influence Internet users to compliance cyber ethics. Using university students as a sample, one hundred and ninety six are collected for further analysis. The results of this study are as follows; First, self-esteem, Moral Obligation, self-control, cyber ethics education and Social Influence are significantly related to cyber ethics awareness, while punishment is not significantly related. Second, cyber ethics awareness have a positive effect on cyber ethics compliance behavior Intention. Third, the moderating effect of ego strength is also significant. This study is significant in that it established a behavior model to understand the compliance of cyber ethics with internet user in Korea.

Effects of Driving Environment on Driver's Posture (주행중 운전자세 측정을 통한 주행조건 영향 분석)

  • Kim, Taeil;Choi, Kwangsoo;Jung, Eui S.;Park, Sungjoon;Choi, Jaeho
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.29 no.4
    • /
    • pp.271-282
    • /
    • 2003
  • Automotive occupant packaging has been a part of main ergonomics interests, especially, in terms of driver's posture. Previous research on driver's posture has mainly focused on the initial optimal posture for driving sedans. However, customer preferences on cars are shifting from sedans to RV and automobile manufacturing companies seek to understand temporal changes in drivers' posture according to driving environment. So the main aim of this study was to develop a driver's posture measurement system during driving and investigate casual changes due to duration, car type, traffic flow. Four male drivers participated in the experiments during one week. It was shown that considerable changes in their postures were caused with respect to driving environment, which implies that not only static optimal postures but their dynamic changes should be taken into consideration for proper design and evaluation of interior packaging. The research is expected to help packaging designers understand human drivers so as to improve their comfort.