• 제목/요약/키워드: information activities

검색결과 6,863건 처리시간 0.031초

정보보호 아키텍처 구성과 보안활동이 정보자산보호 및 조직성과에 미치는 영향 (The Effect of Composition and Security Activities for Information Security Architecture on Information Asset Protection and Organizational Performance)

  • 정구헌;이동욱;정승렬
    • 정보처리학회논문지D
    • /
    • 제17D권3호
    • /
    • pp.223-232
    • /
    • 2010
  • 본 연구는 정보보호 아키텍처 구성과 보안활동이 정보자산보호 및 조직성과에 미치는 영향력을 밝히는데 목적을 갖고 정부, 공공기관, 민간 기업 종사자 300명을 대상으로 설문조사 하였다. 연구결과 분류식별과 위험분석 관리요인이 내부정보 유출방지를 위한 정보보호 아키텍처 구성 및 보안활동에 유용성을 갖는 것으로 나타났다. 그리고 정보기술 아키텍처와 구성원의 인식과 교육요인은 기각됨으로써 제한적인 정보보호 아키텍처 구성 및 보안활동이 요구됨을 시사해 주었다. 독립변인으로서의 아키텍처와 구성원에 대한 재인식을 위한 교육은 그 만큼 중요함을 인식시켜 주고, 일반화된 프로세스로 정보보호 통제나 관리 활동에 크게 기여하지 못하고 다만 위험분류 식별관리와 위험분석 관리의 일반화를 통한 엄격한 보안활동이 유의적인 조직성과에 미치는 영향이 큼을 시사해 준 것이라 할 수 있다.

기업의 정보보호활동의 효율성 평가 (An Evaluation of the Efficiency of Information Protection Activities of Private Companies)

  • 최원녕;김우제;국광호
    • 융합보안논문지
    • /
    • 제18권5_1호
    • /
    • pp.25-32
    • /
    • 2018
  • 해킹 공격이 지능화되고 증가됨에 따라 공공 및 민간기업들은 중요한 자산 및 개인정보를 보호하기 위해 많은 비용을 투자하고 정보보호인력을 충원하여 다양한 정보보호활동을 진행하고 있다. 이와 함께 많은 비용과 인력을 요구하는 정보보호활동이 효율적으로 수행되고 있는지를 평가하는 것은 매우 중요하다. 하지만 정보보호 효율성 평가연구는 주로 정보수집이 보다 수월한 정부기관에 대해서 행해져 왔다. 본 연구는 다양한 민간 기업들의 정보보호인증 및 정보보호활동에 대한 효율성을 평가하는 모델을 제시하는데 목적이 있다. 이를 위해 민간 기업들의 정보보호활동에 대한 공시된 자료인 정보보호공시 정보를 활용하여 계층구조분석(AHP) 과 자료포락분석(DEA) 기법을 적용하여 정보보호 효율성을 평가하였다. 또한 효율성 평가 모델을 통해 효율적으로 운영되고 있는 DMU를 선별하고 비효율적인 DMU들이 효율적으로 운영하기 위해 개선되어야 할 보안활동요소들에 대해 알아본다.

  • PDF

정보활동을 통한 미래자서전 쓰기가 고등학생의 자아정체감에 미치는 영향 (The Effects of Writing Future Autobiography Using Information Activities on High School Student's Ego-identity)

  • 서행민;이병기
    • 한국도서관정보학회지
    • /
    • 제46권4호
    • /
    • pp.599-620
    • /
    • 2015
  • 본 연구는 학교도서관에서 정보활동을 통한 미래자서전 쓰기 프로그램을 전개한 후 고등학생의 자아정체감에 어떤 영향을 미치는지를 알아보는데 목적이 있다. 이 연구는 고등학교 2학년 198명을 대상으로 진행하였다. 정보활동을 통한 미래자서전 쓰기는 주 1회 50분씩 총 15차시에 걸쳐 학교도서관에서 이루어졌으며, 학생들은 자신과 자신의 삶에 대해 알아볼 수 있는 정보활동을 전개한 후, 이를 바탕으로 미래자서전을 쓰고 한 권의 책으로 만들어냈다. 사전-사후 대응표본 t-검증을 통해 미래자서전 쓰기 프로그램 적용 전후의 자아정체감 변화를 분석한 결과 유의미한 차이가 있는 것으로 나타났다.

Participatory Web Users’ Information Activities and Credibility Assessment

  • Rieh, Soo-Young
    • 한국문헌정보학회지
    • /
    • 제44권4호
    • /
    • pp.155-178
    • /
    • 2010
  • Assessment of information credibility is a ubiquitous human activity given that people constantly make decisions and selections based on the value of information in a variety of information seeking and use contexts. Today, people are increasingly engaging in diverse online activities beyond searching for and reading information, including activities such as creating, tagging and rating content, shopping, and listening to and watching multimedia content. The Web 2.0 environment presents new challenges for people because the burden of information evaluation is shifted from professional gatekeepers to individual information consumers. At the same time, however, it also provides unprecedented opportunities for people to use tools and features that help them to make informed credibility judgments by relying on other people's ratings and recommendations. This paper introduces fundamental notions and dimensions of credibility, and contends that credibility assessment can be best understood with respect to human information behavior because it encompasses both the level of effort people exert as well as the heuristics they employ to evaluate information. The paper reports on a survey study investigating people's credibility judgments with respect to online information, focusing on the constructs, heuristics, and interactions involved in people's credibility assessment processes within the context of their everyday life information activities. Using an online activity diary method, empirical data about people's online activities and their associated credibility assessments were collected at multiple points throughout the day for three days. The results indicate that distinct credibility assessment heuristics are emerging as people engage in diverse online activities involving more user-generated and multimedia content. A heuristic approach suggests that people apply mental shortcuts or rules of thumb in order to minimize the amount of cognitive effort and time required to make credibility judgments. The paper discusses why a heuristic approach is key to reaching a more comprehensive understanding of people's credibility assessments within the information-abundant online environment.

인터넷 기반 디자인 및 생산지원 분산환경 프로세스관리 기법 연구 (Internet Based Managing Design and Production Processes in a Distributed Global Environment)

  • 박화규
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제9권1호
    • /
    • pp.217-234
    • /
    • 2000
  • This paper is to develop an information infrastructure to support managing process in design, planning, production, and quality control. Multi-media data set of design, product, and management information flow between organizational units of a virtual enterprise. The process is the logical organization of people, technology and practices incorporated into work activities to make an end product. The core of the infrastructure is the enterprise framework which coordinates activities and controls the process. The proposed framework manages collaborative activities across space and time, and between users and computers who share information in virtual community. It utilizes knowledge distributed through virtual community and fosters cooperation between organizations. The framework provides the following facilities; coordinating activities, sharing data and processes, visualizing multi-media data, customizing and updating processes, reusing data and processes. This paper covers design and manufacturing activities but our focus is initially targeted at design area.

  • PDF

제약회사의 판촉전략이 의약품 처방에 미치는 영향 (The Effects of Promotion Activities of Pharmaceutical Companies on Physicians' Prescription)

  • 박상준
    • 경영과학
    • /
    • 제28권2호
    • /
    • pp.93-103
    • /
    • 2011
  • This paper has aimed to identify marketing variables which affect physicians' prescription of drug. Based on a literature review this paper derives the three factors (indirect commercial source, direct commercial source, academic information source) of information sources that physicians rely on for medicines, the three factors (research supporting activity, marketing supporting activity, medicine information supporting activity) of promotion activities physicians prefer, and the four factors (indirect quality of medicine, direct quality of medicine, experience of using medicine, price and design of medicine) of prescription criteria physicians use. Then it investigates using canonical correlation analysis whether or not physicians' prescriptions are affected by the information sources, the promotion activities, and the type of physicians. From the canonical correlation analysis this paper derives the meaningful three canonical functions of prescription for drugs. The first function explains the prescription which is insensitive to marketing activities, the second function does the prescription which is sensitive to them, and the final function does the prescription which is not affected by them.

Activation of Ontact Research Using Science & Technology Knowledge Infrastructure ScienceON

  • Han, Sangjun;Shin, Jaemin;Lee, Seokhyoung;Park, Junghun
    • Journal of Information Science Theory and Practice
    • /
    • 제10권spc호
    • /
    • pp.1-11
    • /
    • 2022
  • As data-based research activities and outcomes increase and ontact or non-face-to-face activities become common, the demand for easy utilization of resources, tools, functions, and easily accessible information required for research in the R&D sector has increased accordingly. With the rapid increase in the demand for collaborative research based on online platforms, research support institutions strive to provide venues for research activities that merge various information and functions. ScienceON, an integrated science & technology (S&T) knowledge infrastructure service developed and operated by the Korea Institute of S&T Information (KISTI), supports open collaboration by connecting and merging all the information, functions, and infrastructure required for research activities. This paper describes the online research activity support tool provided by ScienceON and the remarkable results achieved through this activity. Specifically, the excellent creation of the following flow of meta-material research activities in the ontact space is elucidated. First, the papers required for a meta-material analysis are retrieved, virtual simulation is conducted with the experimental data extracted from the papers, and research data are accumulated. ScienceON's tools for supporting ontact research activity will play a role as an important service in the era of digital transformation and open science.

Intelligent Healthcare Service Provisioning Using Ontology with Low-Level Sensory Data

  • Khattak, Asad Masood;Pervez, Zeeshan;Lee, Sung-Young;Lee, Young-Koo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권11호
    • /
    • pp.2016-2034
    • /
    • 2011
  • Ubiquitous Healthcare (u-Healthcare) is the intelligent delivery of healthcare services to users anytime and anywhere. To provide robust healthcare services, recognition of patient daily life activities is required. Context information in combination with user real-time daily life activities can help in the provision of more personalized services, service suggestions, and changes in system behavior based on user profile for better healthcare services. In this paper, we focus on the intelligent manipulation of activities using the Context-aware Activity Manipulation Engine (CAME) core of the Human Activity Recognition Engine (HARE). The activities are recognized using video-based, wearable sensor-based, and location-based activity recognition engines. An ontology-based activity fusion with subject profile information for personalized system response is achieved. CAME receives real-time low level activities and infers higher level activities, situation analysis, personalized service suggestions, and makes appropriate decisions. A two-phase filtering technique is applied for intelligent processing of information (represented in ontology) and making appropriate decisions based on rules (incorporating expert knowledge). The experimental results for intelligent processing of activity information showed relatively better accuracy. Moreover, CAME is extended with activity filters and T-Box inference that resulted in better accuracy and response time in comparison to initial results of CAME.

관광호텔의 대 고객 관계 마케팅 활동 개선방안에 관한 연구 (A Study on Improving the Relationship Marketing Activities of Tourist Hotels)

  • 송용덕
    • 한국관광식음료학회지:관광식음료경영연구
    • /
    • 제10권
    • /
    • pp.159-186
    • /
    • 1999
  • This study attempted to present the ways of improving relationship marketing activities of tourist hotels. The field survey was carried out at six deluxe hotels in Seoul to find out their relationship marketing activities and analyze the problems of the activities. The problems were analyzed as follow; 1) lack of adequate understanding of the importance of relationship marketing, 2) poor contents of customer file information, 3) insufficient service encounter management, 4) negative inducement of guests' complaints, 5) insufficient survey of guests' satisfaction, 6) insufficient relationship maintenance programs and regaining program of lost guests. This study relationship marketing activities should be improved with customer information file establishment, service encounter mangement, and communication enforcement as follow; 1. Customer Information File Establishment As relationship marketing Is marketing for individual, it needs customer file information. The guest information files should be made in detail in all the market segments. Hotels have to make use of the information strategically for establishing relationship with their guests. 2. Service Encounter Mnagement Because the guest-oriented mind and professionalism of hotel staff are prerequisite for relationship continuity, hotel should make efforts to make its staff keep the mind and cultivate expert service technique of the staff. 3. Communication Enforcement Communication enforcement consists of communication activities and communication programs which are focused on contact intensity and two-way communication.

  • PDF

A Study on the Information System Maintenance Activities and Performance

  • Lee, Young-Joo;Choi, Young-Jin
    • 한국컴퓨터정보학회논문지
    • /
    • 제20권12호
    • /
    • pp.175-180
    • /
    • 2015
  • It is important to maintain information system (IS) following the business and institutional change. Even if successfully developed information systems, we cannot gain the benefit from the systems without the proactive maintenance activities. However, the importance of IS maintenance has not been considered as much as the system development, and we don't have any specific performance management structure. The objective of this study is to identify the relationship between IS maintenance activities and utilization. For empirical test of the hypothesis model, the sample data is collected from public information system sites. Results from multiple regression analysis reveal that proactive maintenance activities including IS maintenance cost increase, improving functionality, and enhancing ease of use have a causal effect on the IS utilization.