• Title/Summary/Keyword: Research Information Systems

Search Result 12,224, Processing Time 0.043 seconds

Internet Information Orientation: The Link to National Competitiveness on Internet

  • Song, In Kuk;Kang, Mingoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.3028-3039
    • /
    • 2015
  • Recently, the web index of Korea peaked at the top 10 among the eighty six countries, and Korea became the only Asian country ranked at the top level. Korea also has been on the top in the field of Internet penetration rate, in terms of both high-speed broadband and wireless Internet. However, such achievements did not guarantee the national level for the effective use of information utilizing Internet. According to OECD, the national informatization index of Korea has not been free from the middle of the OECD countries. Despite of the heightened pressure in practically enhancing effective information use utilizing Internet, the previous research interests and efforts to develop the Internet-related framework or to identify Internet capabilities rarely existed. The study aims to propose the framework, named "Internet Information Orientation" that illustrates the relationship between Internet capabilities and national competitiveness on Internet. The research identified the specific Internet capabilities, reclassified the capabilities based on the research issues provided at the 6th international conference on Internet held in December 2014, and finally described the rigorous research endeavors on the issues. As a result, 16 papers presented and selected as the outstanding papers at the conference handle issues to be brought together, which include: Wireless Network, Internet of Things, Green Computing, Multimedia Processing, Big Data and Text Mining, Database in Cloud Environment, Business Intelligence, Software Engineering, IT Strategy & Policy, and Social Network Services.

A Cluster-Based Energy-Efficient Routing Protocol without Location Information for Sensor Networks

  • Lee, Gil-Jae;Kong, Jong-Uk;Lee, Min-Sun;Byeon, Ok-Hwan
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.49-54
    • /
    • 2005
  • With the recent advances in Micro Electro Mechanical System (MEMS) technology, low cost and low power consumption wireless micro sensor nodes have become available. However, energy-efficient routing is one of the most important key technologies in wireless sensor networks as sensor nodes are highly energy-constrained. Therefore, many researchers have proposed routing protocols for sensor networks, especially cluster-based routing protocols, which have many advantages such as reduced control messages, bandwidth re-usability, and improved power control. Some protocols use information on the locations of sensor nodes to construct clusters efficiently. However, it is rare that all sensor nodes know their positions. In this article, we propose another cluster-based routing protocol for sensor networks. This protocol does not use information concerning the locations of sensor nodes, but uses the remaining energy of sensor networks and the desirable number of cluster heads according to the circumstances of the sensor networks. From performance simulation, we found that the proposed protocol shows better performance than the low-energy adaptive clustering hierarchy (LEACH).

Impact of Privacy Concern and Institutional Trust on Privacy Decision Making: A Comparison of E-Commerce and Location-Based Service (프라이버시 염려와 제도적 신뢰가 프라이버시 의사결정에 미치는 영향: 전자상거래와 위치기반서비스의 비교)

  • Kim, Sanghee;Kim, Jongki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.1
    • /
    • pp.69-87
    • /
    • 2017
  • This Research Attempted to Clarify the Eeffect of Privacy Concern and Institutional Trust on Privacy Decision based on Privacy Calculus Perspective. We Developed a Research Model Suggesting that the Influence of Privacy Benefit and Privacy risk on the Information Disclosure Behavior and the Influence of Privacy Concern and Institutional Trust on the Privacy Calculus. In this Regard, in Order to Examine the Difference According to the Target whose Personal Information was Collected, an Empirical Analysis was Conducted to Compare the E-commerce Field and LBS(Location Based Service) Field. The Results of Empirical Analysis are as follows. First, it is Founded that other Relations were All Statistically Significant Except the Relation between Privacy Risk and Information Disclosure Behavior in the LBS group. Next, as a Results of Comparison of Constructs in the E-commerce and Institutional trust than the LBS group, Identifying that the Consumers are more Sensitive to the Personal Information Collected in the E-commerce site.

Research of Improvement, and System of the Information Security Management Evaluation (보안관리수준 평가 체계에 대한 분석 및 개선안 연구)

  • Min, Byung-Gil;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.101-112
    • /
    • 2006
  • It will not be able to guarantee the secure operation for the information and communication systems with only technical security. So, ISMS(Information Security Management System) research and standardization are active going on. Korea published "The national cyber security management regulation" and "The national cyber security manual" in 2005. According to the regulation and manual, the government organ and public institution must accomplish the security management assessment to itself for systematic management of an information security. We studied related standards and security management systems of the Australia and the USA, and analyzed the security management evaluation system in "The national cyber security manual" in efficient security management focus. We presented the improvement direction of national security evaluation system through the research. We propose the additional control, selective control set and improvement of the evaluation process for efficient security management. Proposed system possible composition of suitable to each organ and flexible adaptation of rapidly changed information environment.

  • PDF

Traveling Product Bundling on Web Service Composition in Ubiquitous Computing Environment (유비쿼터스 환경에서 복합 상품 구성을 위한 지능형 여행 정보 시스템에 대한 연구 -의미론적 웹 서비스 중심)

  • Lee Hyun-Jung;Sohn Mye-M.
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.2
    • /
    • pp.49-65
    • /
    • 2006
  • In this research, we are suggesting intelligent information system fur traveling which is focusing on product bundling and integration of information from various resources on ubiquitous computing environment. It is necessary for products structure to easily integrate according to customers' requirements because traveling product is integrated by various traveling resources like airline, hotel reservation, and so on. To guarantee of traveler's mobility in ubiquitous computing environment, we need product bundling and modification process to configure products and semantic web service which supports ontology based traveling information system to support immediate integrating of traveling information from various resources. In this research, we offer a product bundling and integration of information. It is based on the semantic web service, with several components (single products) to reconfigure a bundle of traveling products.

  • PDF

AQS: An Analytical Query System for Multi-Location Rice Evaluation Data

  • Nazareno, Franco;Jung, Seung-Hyun;Kang, Yu-Jin;Lee, Kyung-Hee;Cho, Wan-Sup
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.2
    • /
    • pp.59-67
    • /
    • 2010
  • Rice varietal information exchange is vital for agricultural experiments and trials. With the growing size of rice data gathered around the world, and numerous research and development achievements, the effective collection and convenient ways of data dissemination is an important aspect to be dealt with. The collection of this data is continuously worked out through various international cooperation and network programs. The problem in acquiring this information anytime anywhere is the new challenge faced by rice breeders, scientist and crop information specialists, in order to perform rapid analysis and obtain significant results in rice research, thus alleviating rice production. To address these constraints, we propose an Online Analytical Query System, a web query application to provide breeders and rice scientist around the world a fast web search engine for rice varieties, giving the users the freedom to choose from which trial it has been used, trait observation parameters as well as geographical or weather conditions, and location specifications. The application uses data warehouse techniques and OLAP for summarization of agricultural trials conducted, and statistical analysis in deriving outstanding varieties used in these trials, consolidated in an Model-View-Controller Web framework.

A Study on Utilization Method of Information Visualization in the Humanities and Area Studies (인문·지역연구에서의 정보시각화 활용 방안 연구)

  • Kang, Ji-Hoon;Lee, Dong-Yul;Moon, Sang-Ho
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.5 no.5
    • /
    • pp.59-68
    • /
    • 2015
  • Since interdisciplinary convergence could beyond the borders of each disciplines, it is able to create new and meaningful knowledge through collaborative research between different study areas. Especially, in recent years, the Digital Humanities has attracted the attention as the convergence form of the Humanities and ICT. From a research methodology perspective, the Digital Humanities is a tool that can be used as a convergence system for various information utilization such as storage, retrieve, share, and spread. In view of Information system, Digital Humanities has been constructed and used in a variety of systems. Among them, studies related to information visualization for the Digital Humanities have been actively conducted. To visualize data or information, various types such as images, multimedia, interface, and etc could be applied. In this paper, we analyze the cases of various information visualization in digital humanities systems, and propose a method to utilize them in the Humanities and Area Studies.

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

The Current Status of Utilization and Demand on Cancer Information in the Faculties of Medical School in Korea (국내 의과대학 교수의 암정보 활용 현황과 요구도)

  • Lim, Min-Kyung;Park, Sook-Kyung;Yang, Jeong-Hee;Lee, Young-Sung
    • Journal of Preventive Medicine and Public Health
    • /
    • v.36 no.1
    • /
    • pp.39-46
    • /
    • 2003
  • Objectives : To investigate the availability and demand for overall cancer-related information, and to establish a basic plan for the construction of a cancer database and information system based on the research results from Korea. Methods : Postal and telephone surveys were carried out, between August 2001 and November 2001, of 323 affiliated faculty professors from medical universities and colleges in Korea. The data were analyzed with descriptive statistical methods, with regard to the present status and demand for health and cancer-related information. Results : Most (over 80%) subjects studied utilized the health-related information provided on Internet website from foreign countries, such as Medline, but similar comprehensive information system lacked in Korea. The construction of a cancer-related database of domestic research results was revealed to be in a great demand. Information on registration and statistics (52.8%), study results (48.5%) and study resources (37.4%) were the major ingredients required in the database. In constructing a database of the cancer-related research results, a full-text service, continuous updating of data, and the development of standardized user-friendly searching tool were regarded as the necessary components. The formulation of an information sharing system, regarding cancer-related clinical trials, was investigated as being quite feasible. Conclusion : This study demonstrated the great importance of cancer information systems, and much demand for an available cancer-related database based on Korean research results.