• Title/Summary/Keyword: information analysis framework

Search Result 1,805, Processing Time 0.031 seconds

Design of Bytecode Framework (바이트코드 프레임워크 설계)

  • 김영국;김기태;조선문;이갑래;유원희
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.330-334
    • /
    • 2004
  • Java bytecode is stack-base code. Stack-base code makes analysis and optimization hardly because use stack access imperative. Therefore, fragment of code that is problem that occur in stack-base code optimization, loss of type information, unnecessary Load and Store can appear. Optimization and analysis of bytecode design bytecode framework by solution way of problem that is difficult. This paper indicates optimization of bytecode and hangup of analysis, and describe research contents about existent byte code optimization technology. This propose byte code framework by the alternative to simplify analysis and optimization of byte code.

  • PDF

Faceted Framework for Metadata Interoperability (메타데이터 상호운용성 확보를 위한 패싯 프레임워크 구축)

  • Lee, Seung-Min
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.2
    • /
    • pp.75-94
    • /
    • 2010
  • In the current information environment, metadata interoperability has become the predominant way of organizing and managing resources. However, current approaches to metadata interoperability focus on the superficial mapping between labels of metadata elements without considering semantics of each element. This research applied facet analysis to address these difficulties in achieving metadata interoperability. By categorizing metadata elements according to these semantic and functional similarities, this research identified different types of facets: basic, conceptual, and relational. Through these different facets, a faceted framework was constructed to mediate semantic, syntactical, and structural differences across heterogeneous metadata standards.

Methodology for digital investigation of illegal sharing using BitTorrent (BitTorrent를 이용한 저작물 불법 공유 조사 방법에 관한 연구)

  • Park, Soo-Young;Chung, Hyun-Ji;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.193-201
    • /
    • 2013
  • Sharing copyrighted files without copyright holder's permission is illegal. But, a number of illegal file sharers using BitTorrent increase. However, it is difficult to find appropriate digital evidences and legal basis to punish them. And, there are no framework for digital investigation of illegal sharing using BitTorrent. Additionally, role of server in BitTorrent had been reduced than server in conventional P2P. So, It is difficult to apply investigation framework for illegal sharing using conventional P2P to investigation process of illegal sharing using BitTorrent. This paper proposes the methodology about punishing illegal sharer using BitTorrent by suggesting the digital investigation framework.

A Case Study on Expert System Framework for Supporting Army Tactical C4I System (육군 전술C4I체계 지원을 위한 전문가시스템 프레임워크 구축 사례 연구)

  • Kwon, Moon Taek
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.4
    • /
    • pp.127-136
    • /
    • 2006
  • This paper describes the result of a case study for developing an expert system framework in order to support Korean Army tactical C4I system. Korean Army had developed an expert system, STAFS(Situation & Threat Assessment Fusion Expert System), for supporting field intelligence analysis activities which has been implemented through traditional manual process inside the division level combat briefing room. STAFS, however, has serious limitations for supporting combat commander's decision making processes because of its limited capabilities, since the system had been developed for supporting only intelligence analysis function rather than for integrated combat decision making processes inside the combat briefing room. Thus, this paper proposed an integrated expert system framework for supporting the commander's decision making by addressing various activities implemented in the briefing room.

  • PDF

A Study on the Factors Affecting the Information Systems Security Effectiveness of Password (패스워드의 정보시스템 보안효과에 영향을 미치는 요인에 관한 연구)

  • Kim, Jong-Ki;Kang, Da-Yeon
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.1-26
    • /
    • 2008
  • Rapid progress of information technology and widespread use of the personal computers have brought various conveniences in our life. But this also provoked a series of problems such as hacking, malicious programs, illegal exposure of personal information etc. Information security threats are becoming more and more serious due to enhanced connectivity of information systems. Nevertheless, users are not much aware of the severity of the problems. Using appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. The purpose of this research is to empirically analyze a research model which includes a series of factors influencing the effectiveness of passwords. The research model incorporates the concept of risk based on information systems risk analysis framework as the core element affecting the selection of passwords by users. The perceived risk is a main factor that influences user's attitude on password security, security awareness, and intention of security behavior. To validate the research model this study relied on questionnaire survey targeted on evening class MBA students. The data was analyzed by AMOS 7.0 which is one of popular tools based on covariance-based structural equation modeling. According to the results of this study, while threat is not related to the risk, information assets and vulnerability are related to the user's awareness of risk. The relationships between the risk, users security awareness, password selection and security effectiveness are all significant. Password exposure may lead to intrusion by hackers, data exposure and destruction. The insignificant relationship between security threat and perceived risk can be explained by user's indetermination of risk exposed due to weak passwords. In other words, information systems users do not consider password exposure as a severe security threat as well as indirect loss caused by inappropriate password. Another plausible explanation is that severity of threat perceived by users may be influenced by individual difference of risk propensity. This study confirms that security vulnerability is positively related to security risk which in turn increases risk of information loss. As the security risk increases so does user's security awareness. Security policies also have positive impact on security awareness. Higher security awareness leads to selection of safer passwords. If users are aware of responsibility of security problems and how to respond to password exposure and to solve security problems of computers, users choose better passwords. All these antecedents influence the effectiveness of passwords. Several implications can be derived from this study. First, this study empirically investigated the effect of user's security awareness on security effectiveness from a point of view based on good password selection practice. Second, information security risk analysis framework is used as a core element of the research model in this study. Risk analysis framework has been used very widely in practice, but very few studies incorporated the framework in the research model and empirically investigated. Third, the research model proposed in this study also focuses on impact of security awareness of information systems users on effectiveness of password from cognitive aspect of information systems users.

A Chunghae Unit Study on the NCO Effectiveness of Anti-piracy Operation (청해부대 대해적작전의 네트워크작전(NCO) 효과 사례연구)

  • Jung, Wan-Hee
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.6
    • /
    • pp.744-750
    • /
    • 2014
  • In this paper, I have measured NCO(Network Centric Operation) Effectiveness of Anti-piracy Operation at the Chunghae Unit. For quantitative analysis, Network Centric Operations Conceptual Framework(U.S Office of Force Transformation) is applied. In accordance with the framework, the Chunghae unit anti-piracy operation scenario is analysed. The scenario is devided with two case(only voice communication and networking). The element of analysis be composed of the organic information, networking, share-ability, and individual information. As a result of analysis, the individual information of first case(only voice) gets 0.59 points. The other side, second case (networking) gets 1 points. This means that NCO has effect on the Chunghae Unit's mission. In addition, I stated the tactics advantage of NCO related a fighting power.

Unified Psycholinguistic Framework: An Unobtrusive Psychological Analysis Approach Towards Insider Threat Prevention and Detection

  • Tan, Sang-Sang;Na, Jin-Cheon;Duraisamy, Santhiya
    • Journal of Information Science Theory and Practice
    • /
    • v.7 no.1
    • /
    • pp.52-71
    • /
    • 2019
  • An insider threat is a threat that comes from people within the organization being attacked. It can be described as a function of the motivation, opportunity, and capability of the insider. Compared to managing the dimensions of opportunity and capability, assessing one's motivation in committing malicious acts poses more challenges to organizations because it usually involves a more obtrusive process of psychological examination. The existing body of research in psycholinguistics suggests that automated text analysis of electronic communications can be an alternative for predicting and detecting insider threat through unobtrusive behavior monitoring. However, a major challenge in employing this approach is that it is difficult to minimize the risk of missing any potential threat while maintaining an acceptable false alarm rate. To deal with the trade-off between the risk of missed catches and the false alarm rate, we propose a unified psycholinguistic framework that consolidates multiple text analyzers to carry out sentiment analysis, emotion analysis, and topic modeling on electronic communications for unobtrusive psychological assessment. The user scenarios presented in this paper demonstrated how the trade-off issue can be attenuated with different text analyzers working collaboratively to provide more comprehensive summaries of users' psychological states.

Value Chain Analysis of Geospatial Web Service for VGI Application (사용자 참여형 공간정보 웹서비스의 가치사슬분석)

  • Choi, Won Wook;Hong, Sang Ki;Ahn, Jong Wook
    • Spatial Information Research
    • /
    • v.22 no.2
    • /
    • pp.73-87
    • /
    • 2014
  • The fact that the limits of information recency, diversity, and usability are mainly caused by the supply oriented geospatial data and service development is commonly recognized. It is recently tried to overcome the limits by facilitating user experience and VGI(Volunteered Geographic Information) in several geospatial web services. This study suggests 10C framework of geospatial web service for VGI through review and examination of previous research. Based on the 10C framework, the value chain system of 23 use cases relevant to the geospatial web service involving the creation of user's VGI is investigated. The result of the value chain analysis is applied to examine and formulate the strategies to generate value addition from public spatial information with respect to creation, aggregation, delivery, and consumption process of VGI.

Deriving adoption strategies of deep learning open source framework through case studies (딥러닝 오픈소스 프레임워크의 사례연구를 통한 도입 전략 도출)

  • Choi, Eunjoo;Lee, Junyeong;Han, Ingoo
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.27-65
    • /
    • 2020
  • Many companies on information and communication technology make public their own developed AI technology, for example, Google's TensorFlow, Facebook's PyTorch, Microsoft's CNTK. By releasing deep learning open source software to the public, the relationship with the developer community and the artificial intelligence (AI) ecosystem can be strengthened, and users can perform experiment, implementation and improvement of it. Accordingly, the field of machine learning is growing rapidly, and developers are using and reproducing various learning algorithms in each field. Although various analysis of open source software has been made, there is a lack of studies to help develop or use deep learning open source software in the industry. This study thus attempts to derive a strategy for adopting the framework through case studies of a deep learning open source framework. Based on the technology-organization-environment (TOE) framework and literature review related to the adoption of open source software, we employed the case study framework that includes technological factors as perceived relative advantage, perceived compatibility, perceived complexity, and perceived trialability, organizational factors as management support and knowledge & expertise, and environmental factors as availability of technology skills and services, and platform long term viability. We conducted a case study analysis of three companies' adoption cases (two cases of success and one case of failure) and revealed that seven out of eight TOE factors and several factors regarding company, team and resource are significant for the adoption of deep learning open source framework. By organizing the case study analysis results, we provided five important success factors for adopting deep learning framework: the knowledge and expertise of developers in the team, hardware (GPU) environment, data enterprise cooperation system, deep learning framework platform, deep learning framework work tool service. In order for an organization to successfully adopt a deep learning open source framework, at the stage of using the framework, first, the hardware (GPU) environment for AI R&D group must support the knowledge and expertise of the developers in the team. Second, it is necessary to support the use of deep learning frameworks by research developers through collecting and managing data inside and outside the company with a data enterprise cooperation system. Third, deep learning research expertise must be supplemented through cooperation with researchers from academic institutions such as universities and research institutes. Satisfying three procedures in the stage of using the deep learning framework, companies will increase the number of deep learning research developers, the ability to use the deep learning framework, and the support of GPU resource. In the proliferation stage of the deep learning framework, fourth, a company makes the deep learning framework platform that improves the research efficiency and effectiveness of the developers, for example, the optimization of the hardware (GPU) environment automatically. Fifth, the deep learning framework tool service team complements the developers' expertise through sharing the information of the external deep learning open source framework community to the in-house community and activating developer retraining and seminars. To implement the identified five success factors, a step-by-step enterprise procedure for adoption of the deep learning framework was proposed: defining the project problem, confirming whether the deep learning methodology is the right method, confirming whether the deep learning framework is the right tool, using the deep learning framework by the enterprise, spreading the framework of the enterprise. The first three steps (i.e. defining the project problem, confirming whether the deep learning methodology is the right method, and confirming whether the deep learning framework is the right tool) are pre-considerations to adopt a deep learning open source framework. After the three pre-considerations steps are clear, next two steps (i.e. using the deep learning framework by the enterprise and spreading the framework of the enterprise) can be processed. In the fourth step, the knowledge and expertise of developers in the team are important in addition to hardware (GPU) environment and data enterprise cooperation system. In final step, five important factors are realized for a successful adoption of the deep learning open source framework. This study provides strategic implications for companies adopting or using deep learning framework according to the needs of each industry and business.

Comparative Analysis of Co-Authorship and Keyword Network for Nanotechnology: Carbon Nanomaterials Field (사회연결망 분석을 활용한 나노기술 연구동향 국가간 비교분석: 탄소나노소재분야 중심)

  • Bae, Seoung-Hun;Kim, JaeSin;Shin, Kwang-Min;Yoon, Jin-Seon;Kang, Sang-Kyu;Kim, Jun-Hyun;Lee, Jungwoo;Kim, Min-Kwan;Han, Chang-Hee
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.26 no.2
    • /
    • pp.172-184
    • /
    • 2017
  • Nanotechnology is a leading branch of technology and is expected to improve national industrial competitiveness. For maintaining a sustainable growth in nanotechnology, Korean government has set up specific plans from a long-term perspective. One of these plans is tracking and promoting certain potential technologies called Future 30 Nanotechnologies. This study aims to develop an analysis framework for comprehending the Future 30 Nanotechnologies. We applied this framework to the carbon nanomaterials field. Through co-authorship and keyword network analysis, we identified the research trends of three countries (i.e., Korea, US, and China.). This research framework could be utilized in the development of a nanotechnology policy.