• Title/Summary/Keyword: information analysis framework

Search Result 1,805, Processing Time 0.036 seconds

Virtual Interactive Construction Education (VICE) using BIM Tools

  • James D. Goedert;Yong K. Cho;Mahadevan Subramaniam;Ling Xiao
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.781-787
    • /
    • 2009
  • Training and process analysis in the construction industry has not taken full advantage of new technologies such as building information modeling(BIM). The purpose of this research is to develop a framework for the virtual interactive construction education system using three dimensional technologies. The modules will simulate the construction process for a facility from start to finish using information drawn from real projects in the built environment. These modules can be used as training tools for new employees where they attempt to optimize time and cost in a virtual environment given a limited number of equipment, time and employee options. They can also be used as a process analysis tool for new construction where a number of situational variables can change leading to exposure of potential risk. These modules would be particularly useful for repetitive construction where the initial project is analyzed for optimization and risk mitigation. This paper describes the framework and shows a residential construction example using a 900 square foot wood frame single family house designed for the United States.

  • PDF

Analysis and Proposal of "Do Not Track" Regulations for Online Behavioral Advertising (온라인 행동기반 맞춤형 광고를 위한 온라인 추적 금지 제도 분석 및 제안)

  • Choi, Jinju;Lee, Chunghun;Kim, Beomsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.155-174
    • /
    • 2012
  • As Online Behavioral Advertising is dramatically growing with usefulness of information and user convenience in recent years, there are privacy issues caused by collecting user's behavioral information without their consent. To tackle the problem, the need of Do Not Track regulations is getting much higher. In Korea, however, it has never existed. So, this study is examining the case of the major countries have been enforcing the law and regulations of DNT. After that, it is classified with four domain (law/regulation, corporation, individual, society) to include all stakeholders of OBA. Furthermore, this study may have academic significance by suggesting DNT framework through analysis of them. Providing DNT mechanism consisted of three type (behavioral information, control, DNT system), it can be useful guidelines for companies to support decision making as introduced DNT. As analyzed between DNT and stakeholders based on the study of OBA market, it will be useful basic material of OBA study later.

Critical Success Factors for the Adoption of Health Management Information Systems in Public Hospitals in Zimbabwe

  • Caleb Manjeese;Indira Padayachee
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.2
    • /
    • pp.82-103
    • /
    • 2023
  • The Zimbabwean healthcare sector faces huge challenges due to increased demands for improved services for a growing number of patients with fewer resources. The use of information and communications technologies, prevalent in many industries, but lacking in Zimbabwean healthcare, could increase productivity and innovation. The adoption of health management information systems (HMISs) can lead to improved patient safety and high-level patient care. These technologies can change delivery methods to be more patient focused by utilising integrated models and allowing for a continuum of care across healthcare providers. However, implementation of these technologies in the health care sector remains low. The purpose of this study is to demonstrate the advantages to be attained by using HMISs in healthcare delivery and to ascertain the factors that influence the uptake of such systems in the public healthcare sector. A conceptual model, extending the technology, organization, and environment framework by means of other adoption models, underpins the study of adoption behavior. A mixed method methodology was used to conduct the study. For the quantitative approach, questionnaires were used to allow for regression analysis. For the qualitative approach, thematic analysis was used to analyse interview data. The results showed that the critical success factors (namely, relative advantage, availability, complexity, compatibility, trialability, observability, management support, information and communication technology expertise, communication processes, government regulation, infrastructure support, organizational readiness, industry and competitive support, external support, perceived ease of use, perceived usefulness, attitude, and intention to use) influenced adoption of HMISs in public hospitals in Zimbabwe.

Factors Influencing User Satisfaction with University Library Websites in Myanmar

  • Thet Mon Swe;Siluo Yang
    • Journal of Information Science Theory and Practice
    • /
    • v.12 no.2
    • /
    • pp.1-21
    • /
    • 2024
  • This study aims to develop a comprehensive technological framework anchored in a theoretical model to assess user satisfaction with university library websites (ULWs) in Myanmar. Adopting a quantitative approach, data were obtained via convenience sampling and subsequent inferential analysis. The target population for this study investigated users of various ULWs in Myanmar who were utilizing six university libraries. Of the collected responses, 273 valid surveys were analyzed using SPSS (version 25) and AMOS. Tools such as structural equation modeling and confirmatory factor analysis played pivotal roles in data interpretation and hypothesis validation. The proposed model highlights the significance of information quality, system quality, and librarian services in influencing both perceived usefulness (PU) and perceived ease of use (PEOU), culminating in user satisfaction. Notably, information quality and librarian services primarily impact PU, while system quality is more influential on PEOU. Interestingly, while PU has a direct bearing on user satisfaction, PEOU does not. Moreover, demographic elements such as age, gender, and education level introduce considerable differences in the utilization of ULW services. Drawing from the study's findings, recommendations are made for ULW managers in Myanmar to bolster services, aligning with user preferences. The resulting framework offers tangible benefits to Myanmar's educational sector, including academia, government entities, librarians, and policy framers. This pioneering research delves into the realm of ULWs in Myanmar's higher education sector. Practically, the research underscores the necessity for stakeholders, encompassing Myanmar's library experts and governing bodies, to elevate the standard of ULWs. Theoretically, a salient takeaway is the direct linkage between heightened usefulness and increased user satisfaction.

An Empirical Study on the Factors Affecting the Adoption of Enterprise Architecture based on the TOE Framework (엔터프라이즈 아키텍처 도입요인에 관한 실증적 연구 : Technology-Organization-Environment 프레임워크를 중심으로)

  • Lee, Young-Ho;Chae, Myung-Sin
    • Korean Management Science Review
    • /
    • v.23 no.2
    • /
    • pp.17-39
    • /
    • 2006
  • Interest in EA has been Increasing recently, however, with the coming into effect from July 2006 of the 'Information Technology Architecture Act' which requires the public sector to adopt EA. Until now, the study of EA has been focused on concepts and methodologies for the adoption of EA. The fundamental issue, however, the study on the factors affecting the adoption of EA, has rarely been explored. This thesis therefore surveyed which factors have affected the adoption of EA. The analysis found that the adoption of EA was affected by the external environmental characteristics such as rules or regulations and the level of competition in the Industry concerned, and by the organization's information technology level. However, technological aspects such as perceived usefulness or perceived ease of use - traditionally considered as critical factors in adopting information technology - were found to be less influential. These results show that in Korea we still do not regard EA as a method of optimizing the IT resources of a company. In order for EA to be widely adopted, therefore, we should Put primary emphasis on efforts to properly appreciate its technological aspects, such as its technological usefulness or convenience.

Influential Factors for COBIT Adoption Intention: An Empirical Analysis

  • Jo, Yoon-Sung;Lee, Jung-Hoon;Kim, Jae-Min
    • International Journal of Contents
    • /
    • v.6 no.4
    • /
    • pp.79-89
    • /
    • 2010
  • In recent years, IT organizations are in the process of introducing IT Governance as the concept and measure of transparency, accountability and effectiveness of IT activities and control for managing governance processes. In this paper, the influential factors for IT organizations to adopt COBIT(The Control Objectives for Information and related Technology) which is a typical framework for effective IT Governance execution were classified and analyzed empirically into internal and external factors. Internal factors were designed based on influential factors in the theory of innovation diffusion, and external factors were designed based on influential factors from outside certification which were absent in COBIT and expertise support from the outside. The result of this study showed that understandability, transition and effectiveness which were internal factors had no effect on COBIT introduction, and only expertise support among certification and expertise support which were external factors had significant effects. This result shows that there are lack of COBIT supports and introduction in internal IT organizations. It is expected that the result of this study will allow strategic approach of COBIT adoption in future by verifying influential factors of COBIT introduction within IT organizations.

Modeling of Public Risk Perception and Risk Communication Research: In A Social-Cognitive Direction

  • Li, Yiwei;Guo, Yu;Ito, Naoya
    • Asian Journal for Public Opinion Research
    • /
    • v.1 no.3
    • /
    • pp.217-231
    • /
    • 2014
  • This study begins with a review of commonly discussed dimensions of public risk perception that may influence public opinion toward risks. Factors that have been revealed by the literature to have substantial impact on risk perception, such as demographic background, trust, and media environment, are also discussed. Meanwhile, we evaluate two well-known research models in the realm of risk analysis: 1) the psychometric paradigm, and 2) the social amplification of risk framework (SARF). Based on a literature review, this study suggests that, besides the psychological and social approach, models of risk perception and risk communication research should shift to a more comprehensive one by considering the interrelations between laypeople and the environment. This study proposes a research model from the perspective of social cognitive theory (SCT) as a potential framework for future studies: 1) in the societal environment, individuals' risk perception and information seeking behavior, which is determined by risk perception will be influenced by trust in regulators and interpersonal trust; 2) in the media environment, individuals' risk perception and information seeking behavior will be influenced by individuals' perceived information characteristics. Knowledge about risk accumulated through information seeking will change risk perception in a longitudinal process.

A Logical Framework of Comparison Shopping Effectiveness and Comparison Challenge Methodology

  • Lee, Jae-Won
    • Proceedings of the CALSEC Conference
    • /
    • 2005.03a
    • /
    • pp.130-134
    • /
    • 2005
  • This research describes the comparison broker's role and its effectiveness measurement using a developed logical framework of comparison shopping service. And verifies that seller-led comparison challenge method provide comparison information of products to buyers more efficiently. In electronic commerce, buyer's satisfaction of purchase (S) can be defined as an interactive function between seller's competitiveness vector (P) of products that supplied to the market, and buyer's informed level vector (B) of products that is known from a lot of sources. Then the buyer's informed level can be changed through the information analysis among products by transformation process using comparison matrix (C). So the role of comparison shopping is to construct a comparison matrix and to serve it to the buyers, and to change the buyer's informed level. The changed informed level influences a buyer's satisfaction, that improved satisfaction of purchase is defined as the effectiveness of comparison shopping. As a perfect provision and usage of comparison matrix is impossible cause of cognitive limit, the most efficient method for improving the comparison effectiveness is the comparison challenge that detects the comparison elements of the largest buyer's information efficiency, and then to be compared between elementary products selectively. This research verifies the substantial superiority of comparison challenge through television market data experiments.

  • PDF

Two Factor Authentication for Cloud Computing

  • Lee, Shirly;Ong, Ivy;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.427-432
    • /
    • 2010
  • The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underlying infrastructure which is resided remotely at cloud servers. However due to the loss of direct control over the systems/applications, users are concerned about the risks of cloud services if it is truly secured. In the literature, there are cases where attackers masquerade as cloud users, illegally access to their accounts, by stealing the static login password or breaking the poor authentication gate. In this paper, we propose a two-factor authentication framework to enforce cloud services' authentication process, which are Public Key Infrastructure (PKI) authentication and mobile out-of-band (OOB) authentication. We discuss the framework's security analysis in later session and conclude that it is robust to phishing and replay attacks, prohibiting fraud users from accessing to the cloud services.

Unstructured Data Quantification Scheme Based on Text Mining for User Feedback Extraction (사용자 의견 추출을 위한 텍스트 마이닝 기반 비정형 데이터 정량화 방안)

  • Jo, Jung-Heum;Chung, Yong-Taek;Choi, Seong-Wook;Ok, Changsoo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.4
    • /
    • pp.131-137
    • /
    • 2018
  • People write reviews of numerous products or services on the Internet, in their blogs or community bulletin boards. These unstructured data contain important emotions and opinions about the author's product or service, which can provide important information for future product design or marketing. However, this text-based information cannot be evaluated quantitatively, and thus they are difficult to apply to mathematical models or optimization problems for product design and improvement. Therefore, this study proposes a method to quantitatively extract user's opinion or preference about a specific product or service by utilizing a lot of text-based information existing on the Internet or online. The extracted unstructured text information is decomposed into basic unit words, and positive rate is evaluated by using existing emotional dictionaries and additional lists proposed in this study. This can be a way to effectively utilize unstructured text data, which is being generated and stored in vast quantities, in product or service design. Finally, to verify the effectiveness of the proposed method, a case study was conducted using movie review data retrieved from a portal website. By comparing the positive rates calculated by the proposed framework with user ratings for movies, a guideline on text mining based evaluation of unstructured data is provided.