• Title/Summary/Keyword: Theory of Information Society

Search Result 3,485, Processing Time 0.036 seconds

Theory and Practice of User Studies (이용자연구의 이론과 실제)

  • Han, Bock Hee
    • Journal of the Korean Society for information Management
    • /
    • v.1 no.1
    • /
    • pp.100-111
    • /
    • 1984
  • The aim of this paper is to explain the theoretical links between the demand for library service and important variables; also it comments on the basis for a theory of the motivations for information-seeking behaviour and suggests the value of an active approach to user studies in libraries and information centers.

  • PDF

A Novel Kernel SVM Algorithm with Game Theory for Network Intrusion Detection

  • Liu, Yufei;Pi, Dechang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.4043-4060
    • /
    • 2017
  • Network Intrusion Detection (NID), an important topic in the field of information security, can be viewed as a pattern recognition problem. The existing pattern recognition methods can achieve a good performance when the number of training samples is large enough. However, modern network attacks are diverse and constantly updated, and the training samples have much smaller size. Furthermore, to improve the learning ability of SVM, the research of kernel functions mainly focus on the selection, construction and improvement of kernel functions. Nonetheless, in practice, there are no theories to solve the problem of the construction of kernel functions perfectly. In this paper, we effectively integrate the advantages of the radial basis function kernel and the polynomial kernel on the notion of the game theory and propose a novel kernel SVM algorithm with game theory for NID, called GTNID-SVM. The basic idea is to exploit the game theory in NID to get a SVM classifier with better learning ability and generalization performance. To the best of our knowledge, GTNID-SVM is the first algorithm that studies ensemble kernel function with game theory in NID. We conduct empirical studies on the DARPA dataset, and the results demonstrate that the proposed approach is feasible and more effective.

Are Online and Offline Delinquency Mutually Exclusive? Blurred Boundaries between Cyber Space and the Real-World

  • Ko, Nayoung;Hong, Myeonggi;Hwang, Jeeseon;Chang, Jeonghyeon;Hwang, EuiGab
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.3048-3067
    • /
    • 2021
  • This study examines the similarities and differences between the causes of juvenile delinquency in online and offline environments and in personal characteristics. The study utilizes data from the '2014 Survey on Juvenile Victimization in Korea'. The population of this survey is students attending middle and high schools across the country. While this paper is based on the Self-Control theory, opportunity factors based on the Routine Activity theory and the Situational Action theory are also applied. Results show that the causes of offline delinquency are low self-control, routine activity and frequent gaming and SNS use. The causes of online delinquency are high self-control, existence of communication with unknown persons and the spectrum of personal information online. The common element of offline and online delinquency was the presence of delinquent peers. These results show that while online and offline delinquency cannot be explained with the same methodology, at the same time they are not mutually exclusive.

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium

  • Liu, Liang;Huang, Cheng;Fang, Yong;Wang, Zhenxue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.5260-5275
    • /
    • 2019
  • In the process of constructing the traditional offensive and defensive game theory model, these are some shortages for considering the dynamic change of security risk problem. By analysing the critical indicators of the incomplete information game theory model, incomplete information attack and defense game theory model and the mathematical engineering method for solving Bayes-Nash equilibrium, the risk-averse income function for information assets is summarized as the problem of maximising the return of the equilibrium point. To obtain the functional relationship between the optimal strategy combination of the offense and defense and the information asset security probability and risk probability. At the same time, the offensive and defensive examples are used to visually analyse and demonstrate the incomplete information game and the Harsanyi conversion method. First, the incomplete information game and the Harsanyi conversion problem is discussed through the attack and defense examples and using the game tree. Then the strategy expression of incomplete information static game and the engineering mathematics method of Bayes-Nash equilibrium are given. After that, it focuses on the offensive and defensive game problem of unsafe information network based on risk aversion. The problem of attack and defense is obtained by the issue of maximizing utility, and then the Bayes-Nash equilibrium of offense and defense game is carried out around the security risk of assets. Finally, the application model in network security penetration and defense is analyzed by designing a simulation example of attack and defense penetration. The analysis results show that the constructed income function model is feasible and practical.

A Critical Review of Semantic Theories of Focus and an Alternative Approach (의미론적 초점 이론에 대한 비판적 고찰과 대안)

  • Wee, Hae-Kyung
    • Language and Information
    • /
    • v.14 no.1
    • /
    • pp.197-227
    • /
    • 2010
  • This study reviews (i) the (dis)advantages of two major semantic theories of focus, i.e., the Alternative Semantics (AS) and the Structured Meaning Theory (SM), and (ii) the hybrid analysis consisting of these two theories proposed by Krifka (2006). After pointing out a problem of this hibrid analysis, this study attempts to show the third alternative, i.e., the theory of identificational predication for focus can solve this problem.

  • PDF

Situational and Verbal Irony, and Paradox Revisited

  • Yoon, Young-Eun
    • Language and Information
    • /
    • v.10 no.2
    • /
    • pp.67-94
    • /
    • 2006
  • This paper revisits some old issues of irony, i.e., situational vs. verbal irony, and irony vs. paradox, in order to further clarify the issues. Although these issues seem to have been fully discussed, there are still unresolved and/or vague aspects that need to be accounted for. This paper also revisits the issue of theorizing the phenomenon of verbal irony, which has long been scrutinized by many philosophers and linguists including Aristotle, Grice, Sperber and Wilson, and recently, Utsumi and Attardo.

  • PDF

An Empirical Study on Behavior and Psychology Concerning Invoice Disposal in the Context of Courier Services: A Comparative Study on Korea and the U.S.

  • Se Hun Lim
    • Asia pacific journal of information systems
    • /
    • v.28 no.2
    • /
    • pp.133-153
    • /
    • 2018
  • This study investigates responses to privacy concerns by analyzing the psychological and behavioral characteristics related to the disposition toward invoices of courier service users. To this end, we develop a theoretical framework by combining stimulus response theory, communication privacy management theory, the theory of reasoned action, and the theory of planned behavior. Based on the theoretical framework, we analyze the relationships between social influence, privacy propensity, privacy control, privacy risk, privacy concern, invoice disposition intention, and invoice disposition behavior in the context of courier services. To test our hypotheses, we survey courier service users in the U.S. and Korea. Using a structural equation model, we test the relationships among these various factors for the courier service users of the two countries. Results have distinct implications for the psychological and behavioral characteristics concerning the disposal of courier invoices and enable understanding of the characteristics of courier service customers of the two countries.

Research on Pattern Elements and Colors in Apparel Design through Fractal Theory

  • Dan Li;Chengjun Yuan
    • Journal of Information Processing Systems
    • /
    • v.20 no.3
    • /
    • pp.409-417
    • /
    • 2024
  • Excellent apparel design can increase market competitiveness. This article briefly introduced the theory of fractals and its application in the field of apparel design. The convolutional neural network (CNN) algorithm was used to assist in the evaluation of apparel designs. In the case analysis, the accuracy of the evaluation was validated by comparing the CNN algorithm with two other intelligent algorithms, support vector machine (SVM) and back propagation (BP). The evaluation of the proposed design showed that compared with SVM and BP algorithms, the CNN algorithm had higher accuracy in evaluating apparel designs. The evaluation result of the proposed apparel design not only further verifies the effectiveness of the CNN algorithm, but also demonstrates that the theory of fractals can be effectively applied in apparel design to provide more innovative designs.

The Effect of Cognitive Absorption on the Individual Intention of Technology Acceptance: An Empirical Study on the MP3 Player (인지적 몰입이 개인의 기술 수용에 미치는 영향: MP3 플레이어에 대한 실증 연구)

  • Kim, Bo-Youn;Lee, Sang-Gun;Kang, Min-Cheol
    • Asia pacific journal of information systems
    • /
    • v.16 no.1
    • /
    • pp.45-69
    • /
    • 2006
  • Technology Acceptance Model (TAM) has been widely used to predict user's behavior to accept the technology. Prior researches have been mainly focused on innovation constructs such as perceived usefulness and perceived ease of use. However, very little research has been conducted to understand individual mental beliefs in technology acceptance and imitation influence. This study integrates Technology Acceptance Model (TAM), Flow Theory (FT) and Diffusion of Innovation Theory (DIT). This paper indicates that imitation context, cognitive absorption (CA) based Flow theory and innovation context are the three important factors influencing user acceptance of information technologies. The proposed model has been tested among 232 users of MP3 players. Results showed that innovation context and cognitive absorption have positive influences on intention to use technology. Not all factors of the imitation context have direct effect on intention to use. However, we found that imitation context has positive influence on intention to use technology through cognitive absorption.

Research on Keyword-Overlap Similarity Algorithm Optimization in Short English Text Based on Lexical Chunk Theory

  • Na Li;Cheng Li;Honglie Zhang
    • Journal of Information Processing Systems
    • /
    • v.19 no.5
    • /
    • pp.631-640
    • /
    • 2023
  • Short-text similarity calculation is one of the hot issues in natural language processing research. The conventional keyword-overlap similarity algorithms merely consider the lexical item information and neglect the effect of the word order. And some of its optimized algorithms combine the word order, but the weights are hard to be determined. In the paper, viewing the keyword-overlap similarity algorithm, the short English text similarity algorithm based on lexical chunk theory (LC-SETSA) is proposed, which introduces the lexical chunk theory existing in cognitive psychology category into the short English text similarity calculation for the first time. The lexical chunks are applied to segment short English texts, and the segmentation results demonstrate the semantic connotation and the fixed word order of the lexical chunks, and then the overlap similarity of the lexical chunks is calculated accordingly. Finally, the comparative experiments are carried out, and the experimental results prove that the proposed algorithm of the paper is feasible, stable, and effective to a large extent.