• Title/Summary/Keyword: digital information environment

Search Result 2,598, Processing Time 0.027 seconds

A Study of Environment Analysis Method for Information Strategy Planning based Scenarios (시나리오 기반의 정보화전략 계획 수립을 위한 환경 분석 방법 연구)

  • Hong, Jin-Woo;Park, Koo-Rack;Kim, Dong-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.195-203
    • /
    • 2016
  • This paper, which was performed for an environmental analysis step in the information strategy planning, proposes the capable method of building a foundation which can improve the quality of results. An existing environment analyzing method is composed with external environment analysis, internal capacity analysis and information direction deriving activity. At the first stage of environment analysis, with current state analysis, preparation of interview with major stakeholder of project, carrying out the interview, added the activities to gain initial direction of the information. Then it applied a key-questioning of convergence scenario-based analysis for external environment analysis and internal capacity analysis. Performing the external environment analysis and internal capacity analysis with analysis model, convergence application of scenario-based analysis model was enabled to verify information direction on the initial setting. The result was applied at actual project site and was enabled to perform the project quickly, and to improve the quality of project results.

Building a Collaborative Sci-Tech Digital Library (협력 기반 과학기술 디지털도서관 구축에 관한 연구)

  • Lee, Na-Nee;Lee, Mi-Wha;Cha, Mi-Kyeong;Chung, Yeon-Kyoung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.41 no.2
    • /
    • pp.219-236
    • /
    • 2007
  • This study was to build a collaborative digital library model between KSTI and JST for sharing science and technology information created in Korea and Japan. For this study, digital library framework, it's main concepts and widely-used digital library technologies were investigated. And also, best practices of collaborative digital library were surveyed to characterize collaborative digital library trends. Collaborative Sci-Tech digital library model proposed in this study can be applied in real environment and expanded into other institutions and/or subject areas.

Research on the Design and Use of Digital Badges to Increase Educational Value (교육적 가치를 높이는 디지털배지 설계와 활용 연구)

  • Youn A Min;Ji-Eun Lee
    • Journal of Information Technology Services
    • /
    • v.22 no.6
    • /
    • pp.71-86
    • /
    • 2023
  • The rapid change in industry and the technological gap give rise to social demand for upskilling and reskilling and spread of alternative education. Against this backdrop, digital certification and career management tools can be used to manage various types of learning activities comprehensively. Digital badges provide various kinds of history information related to individual learning, and the reliability and transparency of the issued information can be strengthened by applying blockchain technology. There have been various discussions about digital badges for a long time, but due to the lack of standards to support the issuance and distribution of digital badges, they have been partially used in some areas. However, interest in digital badges is increasing due to the development of related technologies, establishment of standards, paradigm changes in higher education, and government policies related to nurturing digital talent. This paper deals with the use of digital badges for efficient and transparent learning management and career management in an online learning environment. The researcher analyzes the technical characteristics and use cases of digital badges, and proposes a plan for use in online higher education based on them.

A Study on the Model Development of Digital Document Information Center for the National Science, Technology and Industry Information (국가과학기술산업 디지털문헌정보센터 모델 정립에 관한 연구)

  • Kim, Sung-Hyuk;Lee, Hye-Jin
    • Journal of Information Management
    • /
    • v.33 no.1
    • /
    • pp.18-30
    • /
    • 2002
  • This study is to propose the model of Digital Document Information Center at KISTI which is a representative center of science, technology and industry information in Korea. The model proposed at this study is reflected current information environment such as digitalization, Internet and various internal and external situations. Also, the study is proposed the medium and long range plans for the center.

Prototyping-based Design Process Integrated with Digital-Twin: A Fundamental Study (디지털 트윈 개념을 적용한 프로토타이핑 기반 디자인 프로세스: 기초연구)

  • Kim, Jin-Wooung;Kim, Sung-Ah
    • Journal of KIBIM
    • /
    • v.9 no.4
    • /
    • pp.51-61
    • /
    • 2019
  • In the general manufacturing sector, prototyping used to reduce the risks that can arise with new conceptual products. However, in AEC area, it does not mass-produce a building, so the prototype itself becomes a building. Therefore, it is challenging to have prototyping of the same scale as the real thing, and the prototyping process in architecture is very inefficient. The prototyping process in the design stage typically assumes making a scaled model, partial model, or digital model. However, it is difficult for these models to correspond to the actual building and the environment of time and space such as scale, material, environment, load, physical properties and deformation, corrosion, etc., unlike the actual building. When using the digital twin concept in the prototyping process, it is possible to measure performance from the design stage to the operation stage. The digital twin was found by a method for monitoring based on physical twins and real-time linkage in the operation stage. Therefore, if the digital twin concept is applied at the design stage, it is possible to predict performance using not only current performance but also history information using real-time information. In order to apply the digital twin concept to the prototyping design process, we analyze the theoretical considerations and the prototyping design process of the digital twin, analyze the cases and research results where the prototyping design was applied, Provide an applied prototyping design process. The proposed process is tested through a pilot project and analyzed for potential use.

The Creation of Ubiquitous Space from an Urban Planning Perspective : The Case of Digital Media Street (유비쿼터스 공간구현의 도시계획적 모색 : 디지털미디어스트리트를 사례로)

  • Byeon, Chang-Heum;Shin, Jung-Ho;Kim, Dong-Wan;Kim, Jun-Hyung
    • Journal of Information Technology Services
    • /
    • v.2 no.1
    • /
    • pp.145-156
    • /
    • 2003
  • This paper presents and analyzes urban planning process to be adopted to create ubiquitous space in city environment, using City of Seoul's Digital Media Street Project as a case study. The Digital Media Street will become the main pedestrian thoroughfare in the Digital Media City (DMC) in Sangam area, planned to become the world's first ubiquitous environment in full urban scale. Ubiquitous space is reinterpreted from an urban planning perspective, and a new approach to planning such a space is introduced, including strategies to couple technology, space, and human activities. Methodology, role of different actors, planning process, and institutional arrangement are examined in turn, and this yields further agenda for improvements that can be made in planning ubiquitous spaces in the future.

Key Management Server Design in Multiuser Environment for Critical File Protection

  • Sung-Hwa Han
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.2
    • /
    • pp.121-126
    • /
    • 2024
  • In enterprise environments, file owners are often required to share critical files with other users, with encryption-based file delivery systems used to maintain confidentiality. However, important information might be leaked if the cryptokey used for encryption is exposed. To recover confidentiality, the file owner must then re-encrypt and redistribute the file along with its new encryption key, which requires considerable resources. To address this, we propose a key management server that minimizes the distribution of encryption keys when critical files are compromised, with unique encryption keys assigned for each registered user to access critical files. While providing the targeted functions, the server employs a level of system resources comparable to that of legacy digital rights management. Thus, when implemented in an enterprise environment, the proposed server minimizes cryptokey redistribution while maintaining accessibility to critical files in the event of an information breach.

A Study on Extraction and Comparison of Digital Content Key Frame in UCC Service Environment

  • Jang, Eun-Gyeom
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1020-1028
    • /
    • 2011
  • In this paper, we proposed a mechanism that prevents indiscreet use of digital contents, verifies created content's copyrights to provide services to granted user and protects digital contents by law by authenticating the original digital content whenever an infringement of copyright occurs in UCC environments. The proposed mechanism uses specific information and features of contents as copyrights authentication information without additional information. Also, provides the fact of violation by inferring the modification of the original digital contents. That means this mechanism infers same or similar value from the contents; fraudulent use of content, modification of content color, modification of content format, modification of content resolution and illegal use of frame not principal key frame. In that point, we found that the inferred value from the content differed according to features of content modification.

Preemptive or Catch Up? Performance Differences under Enterprise Digital Transformation

  • Peinan Ji;Guang Yu
    • Asia pacific journal of information systems
    • /
    • v.32 no.3
    • /
    • pp.564-579
    • /
    • 2022
  • The use of on-premises technology in the business environment to create a competitive advantage is ushering in a new era known as digital transformation. As the foundation of digital transformation of enterprises, information technology still has a paradoxical effect on enterprises. This paper documents the effect of investments in IT on a firm's long-term profitability performance measures as return on assets (ROA), as well as tests whether the earlier entrant and the later entrant are different in IT investment performance. Using a sample of China's public firms IT investment data between 2016 and 2019, the result indicates that IT investment in firms have a positive effect on firm performance in full sample, but not in the financial industry firms. When it comes to the different investment time, the result shows no significant difference between the earlier entrant firm and the later entrant firm in the full sample, but not in the case of software industry sample. This should help alleviate the concerns that some have expressed about the viability of digital transformation given the highly publicized IT investment and implementation problems at some firms.

A Review of IPTV Threats Based on the Value Chain

  • Lee, Hong-Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.2
    • /
    • pp.163-177
    • /
    • 2009
  • The demand for services using digital technology is constantly increasing as new developments in digital consumer electronics and the Internet are made. This is especially true in terms of the demand for IPTV utilizing high speed Internet networks. Research on IPTV threats is important for facilitating financial transactions via IPTV and preventing illegal use or copying of digital content. Thus, this paper analyzes IPTV threats via the IPTV value chain. That is, the distribution system for IPTV service is analyzed along with the components of the value chain and corresponding IPTV security requirements or security technologies, in order to perform a threat analysis and research suitable for the IPTV service environment. This paper has a greater focus on the value chain of the IPTV business than the approach in previous research, in order to analyze security requirements and technologies that are more applicable to the business environment.