• Title/Summary/Keyword: information theory

Search Result 7,448, Processing Time 0.035 seconds

Beyond Categories: A Structural Analysis of the Social Representations of Information Users' Collective Perceptions on 'Relevance'

  • Ju, Boryung;O'Connor, Daniel O.
    • Journal of Information Science Theory and Practice
    • /
    • v.1 no.2
    • /
    • pp.16-35
    • /
    • 2013
  • Relevance has a long history of scholarly investigation and discussion in information science. One of its notable concepts is that of 'user-based' relevance. The purpose of this study is to examine how users construct their perspective on the concept of relevance; to analyze what the constituent elements (facets) of relevance are, in terms of core-periphery status; and to compare the difference of constructions of two groups of users (information users vs. information professionals) as applied with a social representations theory perspective. Data were collected from 244 information users and 123 information professionals through use of a free word association method. Three methods were employed to analyze data: (1) content analysis was used to elicit 26 categories (facets) of the concept of relevance; (2) structural analysis of social representations was used to determine the core-periphery status of those facets in terms of coreness, sum of similarity, and weighted frequency; and, (3) maximum tree analysis was used to present and compare the differences between the two groups. Elicited categories in this study overlap with the ones from previous relevance studies, while the findings of a core-periphery analysis show that Topicality, User-needs, Reliability/Credibility, and Importance are configured as core concepts for the information user group, while Topicality, User-needs, Reliability/Credibility, and Currency are core concepts for the information professional group. Differences between the social representations of relevance revealed that Topicality was similar to User-needs and to Importance. Author is closely related to Title while Reliability/Credibility is linked with Currency. Easiness/Clarity is similar to Accuracy. Overall, information users and professionals function with a similar social collective of shared meanings for the concept of relevance. The overall findings identify the core and periphery concepts of relevance and their relationships in terms of coreness, similarity, and weighted frequency.

Toward a Structural and Semantic Metadata Framework for Efficient Browsing and Searching of Web Videos

  • Kim, Hyun-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.51 no.1
    • /
    • pp.227-243
    • /
    • 2017
  • This study proposed a structural and semantic framework for the characterization of events and segments in Web videos that permits content-based searches and dynamic video summarization. Although MPEG-7 supports multimedia structural and semantic descriptions, it is not currently suitable for describing multimedia content on the Web. Thus, the proposed metadata framework that was designed considering Web environments provides a thorough yet simple way to describe Web video contents. Precisely, the metadata framework was constructed on the basis of Chatman's narrative theory, three multimedia metadata formats (PBCore, MPEG-7, and TV-Anytime), and social metadata. It consists of event information, eventGroup information, segment information, and video (program) information. This study also discusses how to automatically extract metadata elements including structural and semantic metadata elements from Web videos.

Partitioning and Conveyance Technique of Information Flow for Systems Design

  • Leem, Young-Moon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.23 no.56
    • /
    • pp.35-43
    • /
    • 2000
  • In order to obtain rigorous systems analysis and design, it is essential to understand accurate information flow in the system. For the effective capturing of accurate information flow in a system, it Is vital to control information flow in the system. Also, information and information flow have to be simplified as a deliverable form. This paper presents partitioning and conveyance technique based on the application of situation theory. First, historical background of situation theory will be given. Then necessary conditions and definitions will be provided. Lastly, this paper provides specific technique with example. This introduced technique will be a powerful tool for sharing timely and relevant information in a complex manufacturing system that can be used continuously and efficiently throughout systems operation.

  • PDF

Information Privacy Concerns and Trust in SNS

  • Kim, Yujin;Lee, Hyung-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.223-233
    • /
    • 2022
  • In this paper, we examined the causes of information privacy concerns, trust and related factors in social network services. On the basis of the 'elaboration likelihood model,' we established factors such as information quality, privacy policy, perceived SNS app popularity and optimism bias affecting information privacy concern of SNS users. In addition, we analyzed the relationship between information privacy concern, trust in SNS members, trust in SNS platform and intention to use. Finally, on the basis of the 'trust transfer theory', we analyzed the relationship between trust in SNS members and trust in SNS platform. The results of the study showed that (1) information quality, privacy policy and optimism bias had the significant effects on information privacy concerns, (2) perceived SNS app popularity didn't affect information privacy concerns, (3) information privacy concerns had the significant effects on trust in SNS platforms (4) in accordance with the trust transfer theory, trust in SNS members had the significant effect on trust in SNS platforms, and (5) trust in SNS members had the significant effect on intention to use, while trust in SNS platform didn't have the significant effect on intention to use. The findings of the study are expected to help to improve the SNS firms' understanding towards customers' information privacy protection behaviors and trust.

A Study on the Effects of Information Security Policy Types and Information Security Stress on Information Security Behavior (정보보안 정책 유형과 보안 스트레스가 정보보안 행동에 미치는 영향에 대한 연구)

  • Lee Kwang Ho;Jung Chan gi
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.113-120
    • /
    • 2022
  • Despite the limitations of existing security policies due to technological development, companies are unable to actively respond to changes by maintaining a closed security policy. This study classified information security policy into three types: regulatory type policy, advisory type policy, and informative type policy. For each classified policy type, the effect on the information security policy compliance behavior of organizational members was investigated by applying the extended theory of planned behavior, and the moderating effect of information security stress was investigated. SmartPLS 2.0 and SPSS 21.0, which are structural equation modeling techniques, were used to analyze the relationship affecting each factor. As a result of the study, regulatory type, advisory type, and informative type security policies affected organizational members' information security policy compliance behavior, and security stress had an effect on information security compliance attitudes and subjective norms on information security, which are prerequisites for planned behavior theory. gave. This study suggests that various types of corporate information security policies can be applied and that security stress can affect information security behaviors of members.

Mechanism of aging and prevention (노화의 기전과 예방)

  • Kim, Jay Sik
    • IMMUNE NETWORK
    • /
    • v.1 no.2
    • /
    • pp.104-108
    • /
    • 2001
  • Aging is a senescence and defined as a normal physiologic and structural alterations in almost all organ systems with age. As Leonard Hayflick, one of the first gerontologists to propose a theory of biologic aging, indicated that a theory of aging or longevity satisfies the changes of above conditions to be universal, progressive, intrinsic and deleterious. Although a number of theories have been proposed, it is now clear that cell aging (cell senescence) is multifactorial. No single mechanism can account for the many varied manifestations of biological aging. Many theories have been proposed in attempt to understand and explain the process of aging. Aging is effected in individual by genetic factors, diet, social conditions, and the occurrence of age-related diseases as diabetes, hypertension, and arthritis. It involves an endogenous molecular program of cellular senescence as well as continuous exposure throughout life to adverse exogenous influences, leading to progressive infringement on the cell's survivability so called wear and tear. So we could say the basic mechanism of aging depends on the irreversible and universal processes at cellular and molecular level. The immediate cause of these changes is probably an interference in the function of cell's macromolecules-DNA, RNA, and cell proteins-and in the flow of information between these macromolecules. The crucial questions, unanswered at present, concerns what causes these changes in truth. Common theories of aging are able to classify as followings for the easy comprehension. 1. Biological, 1) molecular theories - a. error theory, b. programmed aging theory, c. somatic mutation theory, d. transcription theory, e. run-out-of program theory, 2) cellular theories - a. wear and tear theory, b. cross-link theory, c. clinker theory, d. free radical theory, e. waste product theory, 3) system level theory-a. immunologic/autoimmune theory, 4) others - a. telomere theory, b. rate of living theory, c. stress theory, etc. Prevention of aging is theoretically depending on the cause or theory of aging. However no single theory is available and no definite method of delaying the aging process is possible by this moment. The most popular action is anti-oxidant therapy using vitamin E and C, melatonin and DHEA, etc. Another proposal for the reverse of life-span is TCP-17 and IL-16 administration from the mouse bone marrow B cell line study for the immunoglobulin VDJ rearrangement with RAG-1 and RAG-2. Recently conclusional suggestion for the extending of maximum life-span thought to be the calory restriction.

  • PDF

A Model for Measuring the R&D Project Similarity using Patent Information (특허 정보를 활용한 R&D 과제 유사도 측정 모델)

  • Kim, Jong-Bae;Byun, Jung-Won;Sun, Dong-Ju;Kim, Tae-Gyun;Kim, Yung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1013-1021
    • /
    • 2014
  • For efficient investments of government budgets, It is important to analyze the similarities of R&D projects. So, existing studies have proposed a techniques for analyzing similarities using keywords or segments. However, the techniques have low accuracy. We propose a technique for similarities of projects using patent information. To achieve our goal, we suggest three metrics that are based some mathematic theories; set theory and probability theory. In order to validate our technique, we perform case studies that have 156 R&D projects and 160,218 patent informations.

The Impact of Perceived IT Threat on Convergence Information System Performance (지각된 IT위협이 융합 정보시스템 성과에 미치는 영향)

  • Park, Hyeon-Ho;Nho, Hee-Ock;Kim, Yong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.3
    • /
    • pp.65-71
    • /
    • 2015
  • Based on Technology Threat Avoidance Theory, this study explains the process that the users cope with IT Threat and accomplish IS outcome. To empirically test the proposed model, data were collected through a survey of respondents who have the experience of using IS, and analyzed by using structural equations modelling. The result shows IT Threat had negative effects on Problem-Focused Coping and IS Appropriation. Also Problem-Focused Coping had significant effects on IS Appropriation and IS Appropriation had positive relation on IS Performance. In conclusion the study proposed that IT users improve Convergence Information System Performance by Problem-Focused Coping when they perceive IT Threat.

Price Evaluations on Tourist of Jeju Tourism Package Product: Focused on Prospect Theory (제주특별자치도 관광패키지상품 가격 평가: 전망이론을 적용하여)

  • Park, Suk-Jin;Kim, Tae-Heon
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.6
    • /
    • pp.469-480
    • /
    • 2013
  • This study suggests 12 products regarding the pending question of tourism package price mechanism which is linked directly and indirectly to Jeju Tourism, and shows the following conclusions through inspection in mental accounting principles and framing effect based on prospect theory. First, when presenting the price list of the tourism package, it is needed to present in price bundling. Second, it is proven that it is desirable that information about discount prices open the individual discount information of the basic package and option package to public. Third, it is discovered that experienced tourists in purchasing tourism products are more sensitive to price information (price discount) than inexperienced tourists, so that framing effect conform to Knowledge-assembly theory. The current questions of this study are that 'no discount' information should be presented in bundling, that the method of framing is important in presenting discount product information. It is required not only to grasp the viewpoint of modern people in purchasing tourism products, but also to present ready-to-serve products which can save time, effort, cost to give stability in mental accounting principles.

A Study on the Philosophical Analysis Model and its Methodological Application of Information Systems Research.Evaluation - A Critical Realist Approach - (정보체계 탐구.평가의 철학적 분석 모델과 그 방법론적 활용: 비판 실재론적 접근)

  • Ko, Chang-Taek
    • The Journal of Information Systems
    • /
    • v.16 no.4
    • /
    • pp.131-155
    • /
    • 2007
  • The purpose of this thesis is to study on the philosophical analysis model and its methodological application of information systems research evaluation from critical realist perspective. Fist of all, I examine ontological epistemological methodological assertions of critical realism. Because the philosophy of critical realism is an opportunity for information systems study. I examine Dobson and Mutch's critical realist perspective on actors-structure model. I suggest a critical realist actors-praxis-structure model. This model provides the potential for a new approach to social investigations in its provision of an ontology for the analytical separation of structure and agency. Of most importance might be the incorporation of non-humans into the analysis of social interaction and of technology into the elaboration of structures. I also examine Tsoukas's critical realistic meta-theory of management. I suggest a critical realist IS management model. This model elucidate the nature of management and delineate the scope of applicability of various perspectives on management. The causal powers of management reside in the real domain and, taken together, their logics are contradictory, the effects of their contradictory composition are contingent upon prevailing contingencies. I analyze Carlsson's theory of design knowledge. His framework builds on that the aim of IS design science research is to develop practical knowledge for the design and realization of different classes of IS initiatives, where IS are viewed as socio-technical systems and not just IT artefacts. The framework proposes that the output of IS design science research is practical IS design knowledge in the form of field-tested and grounded technological rules. The IS design knowledge is developed through an IS design science research cycle. In conclusion, I think that IS actors-praxis-structure model, meta-theoretical IS management model, and IS design knowledge model according to critical realistic approach are very useful for IS research evaluation. Nevertheless, important problems are left not resolved.

  • PDF