• Title/Summary/Keyword: Social Metadata

Search Result 64, Processing Time 0.025 seconds

The method of music exploration using dynamic menu trees based on contexts (동적 트리 생성/탐색을 통한 Context 기반 연관 음악 탐색 방법)

  • Lee, Gwang-Hyeon;Choe, Chang-Gyu;Jo, Seong-Jeong;Seong, Yeong-Hun;Kim, Yeon-Bae
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.182-188
    • /
    • 2007
  • 모바일 음악 재생 장치의 보급이 활성화 되면서 모바일 환경에서 음악을 즐기고자 하는 욕구가 확대되었다. 모바일 음악 재생 장치의 저장 공간이 확대되어 한번에 많은 곡을 보유하게 되었지만, 실제적으로 많은 곡 중에서 자신이 원하는 곡을 쉽게 찾을 수 있는 방법이 존재하지 않고 있다. 이런 문제들을 해결하기 위해 해당 음악 고유의 Metadata를 활용하여 쉽게 찾고자 하는 경향이 있지만, 현재까지는 단순한 사용자 인터페이스만 제공하고 있다. 각각의 음악은 음악 고유의 Context도 가지게 되며, 사용자의 음악 감상 로그에 의해 생성되는 개인화 Context 및 같은 음악을 즐기는 다른 사용자들에 의해 생성되는 Social Context등으로 하나의 음악과 관련된 Context가 증가되는 추세에 있다. 이와 같이 추가되는 Context들은 음악을 탐색하는데 있어 효과적인 수단이 제공되어야 하지만 모바일 음악 재생장치에 있는 음악 탐색 프로그램은 새롭게 추가되는 Context 에 의한 효과적으로 대응하지 못하고 있다. 이러한 문제점을 해결하기 위해서 모바일 장치에 Embedded Database Engine을 장착하여 동적 트리 생성/탐색을 통한 Context 기반 연관 음악 탐색 방법을 제안하게 되었다. 본 논문에서는 새롭게 고안된 음악 탐색 방법에 대하여 3가지 사항에 대해서 제시하였다. 첫째, 새로운 Context추가에 대한 동적 메뉴 추가 방법을 제시하였다. 둘째, 실제로 새롭게 추가된 사용자 인터페이스에 대해서 알아보았으며, 마지막으로 제시된 방법이 얼마나 효과적인가를 계산하여 일반화 하였다.

  • PDF

A Study of Ways to Improve Periodical Indexing Services in Korea (정기간행물 기사색인 서비스 현황 및 발전방향에 대한 연구)

  • Lee, Eun-Chul;Lee, Sang-Bok;Oh, Sam-Gyun;Park, Ok-Nam
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.43 no.1
    • /
    • pp.189-214
    • /
    • 2009
  • The study acknowledges the values of periodical indexing as information resources. The study identified periodicals users' needs of article indexing services based on focus group interviews. The study also conducted a comparative study of periodicals indexing services of libraries and databases in Korea and the US. The study argues for the need of seamless services for users of periodical articles indexing services. The study also recommends the elements needed for improving the current service, which includes establishing a collaborative indexing system, adopting a metadata standard, implementing authority files, incorporating social web services, offering diverse ways of information discovery based on facet approach, and stabilizing identification systems.

A Study on the Standardization Strategy for e-Learning Quality Assurance (e-Learning QA 표준화 전략에 관한 연구)

  • Han, Tae-In;Kim, Kwang-Myung
    • Journal of Digital Convergence
    • /
    • v.3 no.2
    • /
    • pp.143-157
    • /
    • 2005
  • Many papers point out that the e-Learning is one of the most important industries, and the effect on other industries can be more powerful than any other business. Therefore, we think about social, cultural, industrial and technological effect of the e-Learning in order to enlarge industry scale as well as educational performances. In many cases of developed countries, various kinds of study have been performed for the e-Learning quality assurance because quality of the e-learning should operate on effective and efficient learning and continuous market development of education industries. The e-Learning quality assurance has import function not only for learning contents reusability like a SCORM and metadata but also for learning system, solution and service operation, so activities for the quality assurance should consider of cultural and tactical approach when it is applied in the e-learning business. In this paper, we present the concept, domain and purpose of the e-Learning quality assurance. Furthermore, this paper proposes the process and methodology in order to make the quality assurance standard model which is consist of 6 phase such as Environment Research, Needs Analysis, Framework, Metrics, Development and Implementation, Evaluation and Feedback through the analysis and comparison of pre-studied worldwide quality control, management and assurance documents.

  • PDF

Real 3D Property Integral Imaging NFT Using Optical Encryption

  • Lee, Jaehoon;Cho, Myungjin;Lee, Min-Chul
    • Current Optics and Photonics
    • /
    • v.6 no.6
    • /
    • pp.565-575
    • /
    • 2022
  • In this paper, we propose a non-fungible token (NFT) transaction method that can commercialize the real 3D property and make property sharing possible using the 3D reconstruction technique. In addition, our proposed method enhances the security of NFT copyright and metadata by using optical encryption. In general, a conventional NFT is used for 2D image proprietorial rights. To expand the scope of the use of tokens, many cryptocurrency industries are currently trying to apply tokens to real three-dimensional (3D) property. However, many token markets have an art copyright problem. Many tokens have been minted without considering copyrights. Therefore, tokenizing real property can cause significant social issues. In addition, there are not enough methods to mint 3D real property for NFT commercialization and sharing property tokens. Therefore, we propose a new token management technique to solve these problems using integral imaging and double random phase encryption. To show our system, we conduct a private NFT market using a test blockchain network that can demonstrate the whole NFT transaction process.

A Study on the Mechanism Governing the Use of Makeup-type Digital Shadow Work: A Case of Profile Picture Management (메이크업형 디지털그림자노동 사용을 지배하는 기제에 관한 연구: 프로필 사진 관리 사례)

  • Lee, Woong Kyu;Cho, Ara
    • The Journal of Information Systems
    • /
    • v.31 no.3
    • /
    • pp.1-18
    • /
    • 2022
  • Purpose The purpose of this study is to analize a psychological and behavioral mechanism for using profile picture management in digital service such as social network service. Profile picture management falls under metadata management and is performed only by those who want it. This means that it, is one of the typical makeup-type digital shadow works (DSWs) which have not been studied yet. Design/methodology/approach This study adopts ground theory method(GTM) as research methodology. GTM, which is one of qualitative methodologies, is for developing theories while most survey based methodologies, which are well adopted in much research for information systems, are for validation of theories. By interviewing ten users, the data are collected and analyzed by open coding, axis coding with paradigm model, and selective coding. Findings In result, 39 codes are found and classified into 29 sub classes and 15 classes. These 15 classes are organized by paradigm model which derives core code of profile picture management as 'voluntary management tasks to experience small pleasures with intermittent attention'. Finally, based on the paradigm model and the core code, the story line, which can explain profile picture management, is suggested.

Analysis of Components and Institutional Collaboration in the National Crisis Management Manual (국가 위기관리 매뉴얼의 구성 요소 및 기관 협업 분석)

  • You, Beon-Jong;Kim, Byungkyu;Shim, Hyoung-Seop
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.113-116
    • /
    • 2021
  • 우리나라는 최근 COVID-19 감염병 재난에 대한 체계적이고 성공적인 방역과 대응으로 국제적인 주목과 인정을 받고 있으며, 세계 10위 수준의 국가 경제 발전과 재난관리 중요성의 인식 향상에 따라 수준 높은 국가 재난관리 체계에 대한 국민적 관심과 요구가 높아지고 있다. 2004년 국가 위기관리 기본지침의 제정과 함께 국가 위기관리 표준 매뉴얼이 수립된 이래로 국가 위기관리 체계에서 위기관리 매뉴얼은 중추적인 역할을 담당하고 있다. 하지만 4차시대 혁명시대 ICT 기술 및 재난정보들이 융합된 재난 대응 환경에서 책자와 파일 위주의 정적 문서 포맷과 비구조적인 내용구성으로 주요정보 간 연계·활용성이 낮은 현재 매뉴얼 체계는 실제 재난상황에서 KEY 역할을 수행하기에는 여러 측면에서 한계가 뚜렷하다. 본 논문에서는 국가 위기관리 매뉴얼 체계 개선의 초석을 마련하는 단계로써 표준 매뉴얼에 대한 구성요소를 분석하고 기관 간 협업관계를 분석하였다.

  • PDF

A Study on the Construction and Utilization of Digital Archives for Intangible Cultural Heritage in Korea (국내 무형문화유산 디지털 아카이브 구축 및 활용을 위한 연구)

  • Han, Hui-Jeong;Oh, Hyo-Jung;Kim, Tae-Young;Kim, Yong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.27 no.2
    • /
    • pp.95-134
    • /
    • 2016
  • The intangible cultural heritage possesses the extremely important meaning and value irrespective of its form. The value of the intangible cultural heritage becomes the important driving force in the social development as useful resources of reflecting social aspects and historical records that the life and tradition of past is delivered. Hence, this study aims to propose the method to manage and provide of the intangible cultural heritage syntagmatically from the digital aspect. For this the plan, the study compared and analyzed the current status of digital archiving of intangible cultural heritage. Consequently, based on the analysis, policy based on cultural governance and standardized management factors were developed. The method to materialize digital contents was developed for constructing digital archives and utilization of intangible cultural heritage can be facilitated.

Lifecycle and Requirements for Digital Collection Management of Thai Theses and Dissertations

  • Jareonruen, Yuttana;Tuamsuk, Kulthida
    • Journal of Information Science Theory and Practice
    • /
    • v.7 no.3
    • /
    • pp.52-64
    • /
    • 2019
  • This research was aimed at studying the situation, problems, and requirements for digital collection lifecycle management of Thai theses and dissertations. The mixed research method used was composed of: (1) Study of the problem and situation in which the qualitative method was applied. The research site covered 10 higher education institutions where the Thailand Digital Collection (TDC) project is operated. The informants were key administrative officers of the TDC project of each institution. In-depth and structured interviews were conducted on an individual basis to obtain the most accurate answers. (2) Study of requirements based on the quantitative research method to survey the requirements for the digital collection management system for Thai theses and dissertations from 84 purposively-selected TDC project officers and 527 end users selected by accidental sampling, totaling 611 samples. Research findings are as follow: (1) The study of the situation and problems of digital collection lifecycle management shows that Thai higher institutions systematically manage their digital collection. The management lifecycle is consistent with the Guidance documents for lifecycle management of ETDs, which included seven steps: program planning, creation, submission, and ingestion, access and retrieval of digital objects, archiving and preservation, evaluation and assessment, interoperation (creation of institutional collaboration), and development of link data. (2) The study of requirements for digital collection management of Thai theses and dissertations shows five system requirements: acquisition and gathering, digitization, metadata standards, management of rights, and storage and retrieval, all of which are at M (mandatory) and D (desirable) levels.

An Investigation on Data Needs and Data Reuse Behavior in the Field of Social Sciences (사회과학 분야 연구자의 데이터요구와 데이터 재이용 행위에 관한 연구)

  • Kim, NaYon;Chung, EunKyung
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.4
    • /
    • pp.1-26
    • /
    • 2020
  • In today's increasingly data-intensive academic environment, data is becoming the foundation of academic communication as a research outcome rather than a research by-product. However, there is a limit to guaranteeing actual data reuse only by expanding the data supply or securing accessibility. In order to overcome this, it is necessary to understand the data reuse behavior and data needs in-depth. Therefore, this study attempted to identify the major data reuse behavior and data needs among researchers. To this end, the authors of KCI papers among the data reuse documents of the Korea Social Science Data Archive (KOSSDA) for the past 3 years were targeted. An in-depth interview was conducted with 12 researchers who accepted the interview. As a result, factors considered when reusing data were personal, economic, technical, and social aspects, and it was found that the data itself was used or contextual information of the data was used depending on the purpose of data reuse. The path to acquiring data is a web-based source of information, and a path through informal communication can also be found. In terms of the data needs, it was found that they prefer English, the United States, and institutional producers. Also they have a clear preference for quantitative data from an interviewer-filled interpersonal interview survey method, rich metadata along with raw data, and data that contains identification information. However, due to the lack of confidence in the value, it is negative for the use of data with controlled access and use, and it is difficult to confirm a clear preference because there is no similar data available for selection in terms of size and freshness.

Design of Web 2.0 based Bibliographic Information Network for Life Science (Web 2.0 기반의 생명과학 문헌정보 네트워크 설계)

  • Ahn, Bu-Young;Kim, Dae-Jung;Han, Jeong-Min;Park, Yang-Sook
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.1051-1056
    • /
    • 2007
  • In current web-based systems, it is generally recognized that one way flow of information from providers to users can cause the static problem of document structure. Therefore, information update frequency and interaction between providers and users are quiet slow. Monopolized information can obstruct the free user's access and heterogeneous format and different protocols also make users difficult to retrieve and to collect information. To resolve these problems, in this study, we introduce the Web 2.0 to move toward the user's participation and share based on the social network and the OAI protocol to improve the free access and the interoperability on bibliographic information for Life Science and then design the bibliographic information network for life science. This network has four main functions such as: 1) Open Repository function that can make up user community for sharing and data exchange. Data such as article, seminar material, research note and research report are considered in design. 2) Open Collection function that can collect and store the metadata on distributed bibliographic information networks, 3) Open Access function that can manage the metadata in the open access environment, and 4) Administration function that can monitor the user activity and statistics and can inspect the registered data.

  • PDF