• Title/Summary/Keyword: Social Networks Services

Search Result 231, Processing Time 0.024 seconds

Accounting Education in the Era of Information and Technology : Suggestions for Adopting IT Related Curriculum (기술정보화(IT) 시대의 회계 교육 : IT교과와의 융합교육의 제안)

  • Yoon, Sora
    • Journal of Information Technology Services
    • /
    • v.20 no.2
    • /
    • pp.91-109
    • /
    • 2021
  • Recently, social and economic environment has been rapidly changed. In particular, the development of IT technology accelerated the introduction of databases, communication networks, information processing and analyzing systems, making the use of such information and communication technology an essential factor for corporate management innovation. This change also affected the accounting areas. The purpose of this study is to document changes in accounting areas due to the adoption of IT technologies in the era of technology and information, to define the required accounting professions in this era, and to present the efficient educational methodologies for training such accounting experts. An accounting expert suitable for the era of technology and information means an accounting profession not only with basic accounting knowledge, competence, independency, reliability, communication skills, and flexible interpersonal skills, but also with IT skills, data utilization and analysis skills, the understanding big data and artificial intelligence, and blockchain-based accounting information systems. In order to educate future accounting experts, the accounting curriculum should be reorganized to strengthen the IT capabilities, and it should provide a wide variety of learning opportunities. It is also important to provide a practical level of education through industry and academic cooperation. Distance learning, web-based learning, discussion-type classes, TBL, PBL, and flipped-learnings will be suitable for accounting education methodologies to foster future accounting experts. This study is meaningful because it can motivate to consider accounting educational system and curriculum to enhance IT capabilities.

Fine Grained Security in Cloud with Cryptographic Access Control

  • Aparna Manikonda;Nalini N
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.123-127
    • /
    • 2024
  • Cloud computing services has gained increasing popularity in recent years for supporting various on demand and scalable services for IT consumers where there is a need of less investment towards infrastructure. While storage architecture of cloud enjoys a more robust and fault-tolerant cloud computing network, such architecture also poses a number of security challenges especially when applied in applications related to social networks, Financial transactions, etc. First, as data are stored and maintained by individual virtual machines so Cloud resources are prone to hijacked. Such attacks allow attackers to create, modify and delete machine images, and change administrative passwords and settings successfully. hence, it is significantly harder to ensure data security. Second, Due to dynamic and shared nature of the Cloud, data may be compromised in many ways. Last but not least, Service hijacking may lead to redirect client to an illegitimate website. User accounts and service instances could in turn make a new base for attackers. To address the above challenges, we propose in this paper a distributed data access control scheme that is able to fulfil fine-grained access control over cloud data and is resilient against strong attacks such as compromise and user colluding. The proposed framework exploits a novel cryptographic primitive called attribute-based encryption (ABE), tailors, and adapts it for cloud computing with respect to security requirements

Multimedia Contents Recommendation Method using Mood Vector in Social Networks (소셜네트워크에서 분위기 벡터를 이용한 멀티미디어 콘텐츠 추천 방법)

  • Moon, Chang Bae;Lee, Jong Yeol;Kim, Byeong Man
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.6
    • /
    • pp.11-24
    • /
    • 2019
  • The tendency of buyers of web information is changing from the cost-effectiveness to the cost-satisfaction. There is such tendency in the recommendation of multimedia contents, some of which are folksonomy-based recommendation services using mood. However, there is a problem that they does not consider synonyms. In order to solve this problem, some studies have solved the problem by defining 12 moods of Thayer model as AV values (Arousal and Valence), but the recommendation performance is lower than that of a keyword-based method at the recall level 0.1. In this paper, we propose a method based on using mood vector of multimedia contents. The method can solve the synonym problem while maintaining the same performance as the keyword-based method even at the recall level 0.1. Also, for performance analysis, we compare the proposed method with an existing method based on AV value and a keyword-based method. The result shows that the proposed method outperform the existing methods.

A Collaborative Framework for Discovering the Organizational Structure of Social Networks Using NER Based on NLP (NLP기반 NER을 이용해 소셜 네트워크의 조직 구조 탐색을 위한 협력 프레임 워크)

  • Elijorde, Frank I.;Yang, Hyun-Ho;Lee, Jae-Wan
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.99-108
    • /
    • 2012
  • Many methods had been developed to improve the accuracy of extracting information from a vast amount of data. This paper combined a number of natural language processing methods such as NER (named entity recognition), sentence extraction, and part of speech tagging to carry out text analysis. The data source is comprised of texts obtained from the web using a domain-specific data extraction agent. A framework for the extraction of information from unstructured data was developed using the aforementioned natural language processing methods. We simulated the performance of our work in the extraction and analysis of texts for the detection of organizational structures. Simulation shows that our study outperformed other NER classifiers such as MUC and CoNLL on information extraction.

A Study on Design and Implementation of Archival Information Services based on Social Network Service in Mobile Environments (모바일 환경에서의 SNS를 활용한 기록정보서비스 설계 및 구현에 관한 연구)

  • Kang, Hye-Kyung;Kim, Yong
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.12 no.1
    • /
    • pp.33-58
    • /
    • 2012
  • With technological and cultural changes around web and mobile networks, SNS would be considered as an important tool for information sharing. Especially, SNS represented Facebook and Twitter is being new paradigm for communication. This study seeks to methods to provide a service user participation and cooperation and expands use and access to archival information service through SNS. To achieve the goals, this study proposed a method to provide effective archival information service through literature research. Also, the proposed service was implemented with system design and components.

A Computational Model of Trust and Its Applications in Internet Transactions (인터넷 거래에서 신뢰도의 계산적 모델 및 적용)

  • Noh, Sang-Uk
    • Journal of Internet Computing and Services
    • /
    • v.8 no.4
    • /
    • pp.137-147
    • /
    • 2007
  • As Web-based online communities are rapidly growing, the agents in social groups need to know their measurable belief of trust for safe andsuccessful interactions. In this paper, we propose a computational model of trust resulting from available feedbacks in online communities. The notion of trust can be defined as an aggregation of consensus given a set of past interactions. The averagetrust of an agent further represents the center of gravity of the distribution of its trustworthiness and untrustworthiness. And then, we precisely describe the relationship between reputation, trust, and averagetrust through a concrete example of their computations. We apply our trust model to online internet settings in order to show how trust mechanisms are involved in a rational decision-making of the agents.

  • PDF

Research Publishing by Library and Information Science Scholars in Pakistan: A Bibliometric Analysis

  • Ali, Muhammad Yousuf;Richardson, Joanna
    • Journal of Information Science Theory and Practice
    • /
    • v.4 no.1
    • /
    • pp.6-20
    • /
    • 2016
  • Scholarly communication plays a significant role in the development and dissemination of research outputs in library and information science (LIS). This study presents findings from a survey which examines the key attributes that characterize the publishing by Pakistani LIS scholars, i.e. academics and professionals, in national journals. A pilot-tested, electronic questionnaire was used to collect the data from the target population. 104 respondents (or 69.3% of target) provided feedback on areas such as number of articles published, number of citations, and the nature of any collaboration with other authors. The findings of this survey revealed that, among the various designated regions of Pakistan, the Punjab region was the most highly represented. In articles published in national journals, there was a clear preference among all respondents to collaborate with at least one other author. The citation metrics for LIS articles in national journals were relatively low (30.22%), which aligns with Scimago’s Journal and Country Rankings. The uptake of social scholarly networks mirrors international trends. Respondents were asked to score factors which could impact negatively on their ability to undertake research and/or publish the results. The study recommends that concerned stakeholders work together, as appropriate, to address concerns. In addition, it recommends that further research be undertaken to define patterns of Pakistani co-authorship in the social sciences.

Blockchain for the Trustworthy Decentralized Web Architecture

  • Kim, Geun-Hyung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.26-36
    • /
    • 2021
  • The Internet was created as a decentralized and autonomous system of interconnected computer networks used for data exchange across mutually trusted participants. The element technologies on the Internet, such as inter-domain and intra-domain routing and DNS, operated in a distributed manner. With the development of the Web, the Web has become indispensable in daily life. The existing web applications allow us to form online communities, generate private information, access big data, shop online, pay bills, post photos or videos, and even order groceries. This is what has led to centralization of the Web. This centralization is now controlled by the giant social media platforms that provide it as a service, but the original Internet was not like this. These giant companies realized that the decentralized network's huge value involves gathering, organizing, and monetizing information through centralized web applications. The centralized Web applications have heralded some major issues, which will likely worsen shortly. This study focuses on these problems and investigates blockchain's potentials for decentralized web architecture capable of improving conventional web services' critical features, including autonomous, robust, and secure decentralized processing and traceable trustworthiness in tamper-proof transactions. Finally, we review the decentralized web architecture that circumvents the main Internet gatekeepers and controls our data back from the giant social media companies.

Less than Attractiveness of e-Sports Games for Female Audience - Journalism

  • Oleksandr, Petryk;Natalia, Sydorenko;Anastasia, Volobuieva
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.57-62
    • /
    • 2022
  • The attractiveness of e-sports games1 and the way it is spread has changed in recent years. Instead of conventional approaches, such as advertising campaigns or televised events, spectators are increasingly drawn to online platforms, which offer more opportunities for communication. Besides live streaming services like Twitch. tv, where spectators can watch matches in real-time or via recorded videos, social media platforms like Facebook and Twitter are now adding e-sports related content to their networks [1]. Especially the combination of live streams on Twitch, Twitter, and Facebook opens many possibilities regarding how information is shared. This might be an efficient way of spreading attractiveness among female audiences. This paper focuses on the attractiveness of e-sports events in general for females. It has been hypothesized that there are certain factors that influence this attractiveness. Studying past research papers and online resources, three factors were identified: The players' behavior and charisma, the impact of social media as well as videogames themselves. It is found that females are attracted to e-sport games because they allow them to engage more in the game compared to other videogames. This is because there are no time constraints that require players to accomplish certain tasks within a specific time frame. As such, female gamers can choose how much effort they want to put into the game depending on their personal preferences.

A Study on 5G Service Methods by using BOCR Model and ANP

  • Song, Inkuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3299-3312
    • /
    • 2022
  • Recently, South Korea preferentially allocated frequencies to build 5G networks as a core competitiveness of the 4th Industrial Revolution. Although the government recognize the importance of 5G construction and preoccupation, network operators have limited to some services, testing the possibility of practical use of 5G. They hesitated to actively build and to carry out the service of a complete 5G network. While 5G is being developed and standardized like this, no one is sure of this step exactly what 5G will be. Thus, following research questions are asked by various stakeholders of 5G market: What is an ideal service providing method for the practical use of 5th generation mobile network? And what are the critical elements to be considered when selecting the service providing method? Therefore, the study aims to investigate 5G service providing issues and elements to be considered and to provide most appropriate service providing method for the practical use of 5G. The results identify that 'Specialized Service' is most appropriate method at the aspects of benefit and opportunity as well as the aspect of risk. In addition, the outcomes imply that the experts replying to the survey not only expect the expansion of emerging market, but also concern the social risk and cost. Since the study dealt with economic, social and business issues in providing 5G service, it might contribute not only to practical research, but also to academic research regarding 5G service method.