• Title/Summary/Keyword: information assets

Search Result 886, Processing Time 0.025 seconds

User Perception of Ai Self-Organizing Natural Image Generation Analyzed by Cognitive Paradigm

  • Soo-Jin Lee
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.3
    • /
    • pp.67-72
    • /
    • 2024
  • The algorithm is applied on the premise that the image generated by AI can be recognized and used smoothly by the user. Other assets are not exposed to the user or discarded because they are unnecessary or unfamiliar. This study aims to expand the scope of the utility of the image generated by AI, which is used as a high-level tool in the design field. To this end, we first examined human information processing and reflection in AI by the cognitive paradigm by examining previous studies and cases, and discussed the value of expansion by focusing on creativity and bottom-up processing of AI's self-organization. Considering the human recogmition process that instinctively grasps an object, the following AI usability was proposed. It is to utilize AI as a high-level tool applied appropriately to human perception, or to utilize the derivative itself by bottom-up self-organization. In addition, it is to set the algorithm to the minimum intervention so that basic elements such as shape, color, size, texture, and movement are composed of figure-ground according to the human perception process that instinctively grasps an object, and to utilize the results. Limiting the use of AI to a tool suitable for human perception and information processing or production by designers or general users is to operate only a part of the convenience and usability of AI. The image creation through AI's self-organization, as seen from the cognitive paradigm, is a step toward opening a new era of design where technical aesthetics meets devices, just as design has been constantly developing in pursuit of novelty and differentiation due to its nature.

Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study

  • Youngho Kim;Seon-Gyoung Sohn;Kyeong Tae, Kim;Hae Sook Jeon;Sang-Min Lee;Yunkyung Lee;Jeongnyeo Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.9
    • /
    • pp.2665-2691
    • /
    • 2024
  • The philosophy of Zero Trust in cybersecurity lies in the notion that nothing assumes to be trustworthy by default. This drives defense organizations to modernize their cybersecurity architecture through integrating with the zero-trust principles. The enhanced architecture is expected to shift protection strategy from static and perimeter-centric protection to dynamic and proactive measures depending on the logical contexts of users, assets, and infrastructure. Given the domain context of defense environment, we aim three challenge problems to tackle and identify four technical approaches by the security capabilities defined in the Zero Trust Architecture. First approach, dynamic access control manages visibility and accessibility to resources or services with Multi Factor Authentication and Software Defined Perimeter. Logical network separation approach divides networks on a functional basis by using Software Defined Network and Micro-segmentation. Data-driven analysis approach enables machine-aided judgement by utilizing Artificial Intelligence, User and Entity Behavior Analytics. Lastly, Security Awareness approach observes fluid security context of all resources through Continuous Monitoring and Visualization. Based on these approaches, a comprehensive study of modern technologies is presented to materialize the concept that each approach intends to achieve. We expect this study to provide a guidance for defense organizations to take a step on the implementation of their own zero-trust architecture.

A study on the Need for Introducing the Information and Communication Facilities Maintenance Mandatory System: In view of Apartment House Environment) (정보통신설비의 유지관리 의무화제도 도입 필요성에 관한 연구(공동주택환경을 중심으로))

  • Lim, Sang-Chool;Kim, Sun-Hyung
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.6 no.3
    • /
    • pp.15-24
    • /
    • 2007
  • According to an apartment house environment and the service provide method of major telecom operators, is providing optic-LAN service with installing the equipments of optical office center and optic distribution at MDF(Main Distribution Frame) and under-ground of apartment. therefore the distribute is deepening between service providers because of space securement to install equipments and spare pipe securement to reinstall UTP cable. These were reasons that operators leaned to subscriber collection and neglected to maintenance, in addition, insist the facilities invested by each operators is his own assets for all that in-plant of apartment house is private land. So, would not being touched by others. Accordingly, this study will search it through the field current condition examine that service's types and methods which various telecom operators and broadcast operators are providing, the current conditions of being maintained, the problems of being happened. etc. and would like to improve that the users could use the services safely by making the information & communication facilities maintenance mandatory under the regular size of apartment house circumstances through the analysis of various laws relations which are managed information & communication construction work law, telecommunication basis law, home network. etc. technical standards by the Ministry of Information and Communication and are managed housing law, construction law, the regulation related to house construct standards. etc. by the Ministry of Construction and Transportation.

  • PDF

The Effects of Other Comprehensive Income Items on Firm Value of Insurance Companies (보험회사의 기타포괄손익항목이 기업가치에 미치는 영향)

  • Lee, Hyun-Joo;Park, Gu-Yong;Park, Sang-Seob
    • Management & Information Systems Review
    • /
    • v.36 no.3
    • /
    • pp.203-217
    • /
    • 2017
  • This study aims to verify the effects of unrealized gain or loss, that is the fair value evaluation item of insurance company's assets and liabilities, to capital markets focusing on fair value evaluation of insurance company's liabilities, which is the core of IFRS 17 that will be implemented in 2021. For this purpose we carried out regression analysis to verify the effects of changed other comprehensive income(OCI) and accumulated OCI, published in quarterly financial statements of listed insurance companies, on stock price utilizing Ohlson(1995)'s extended test model. The results of the empirical analysis are as follows. First, changed OCI showed a significant negative(-) effects on stock price. Second, accumulated OCI revealed a significant positive(+) effects on stock price. Furthermore, extended test model classifying changed OCI and accumulated OCI in a basic model represented the highest $R^2$ number and public announcement policy of OCI, a kind of unrealized gain or loss item, implied that it could give positive impact on accounting information. But still the direction that unrealized gain or loss affects on firm value must be carefully reviewed and considered in the future via more detailed study by the user of information. Therefore this study is meaningful in that it can predict usefulness of information on insurance company's fair value evaluation via empirical test accompanied by introduction of newly established IFRS 17 and it also can suggest direction of information production suitable for capital market.

  • PDF

Determinants of Mobile Application Use: A Study Focused on the Correlation between Application Categories (모바일 앱 사용에 영향을 미치는 요인에 관한 연구: 앱 카테고리 간 상관관계를 중심으로)

  • Park, Sangkyu;Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.157-176
    • /
    • 2016
  • For a long time, mobile phone had a sole function of communication. Recently however, abrupt innovations in technology allowed extension of the sphere in mobile phone activities. Development of technology enabled realization of almost computer-like environment even on a very small device. Such advancement yielded several forms of new high-tech devices such as smartphone and tablet PC, which quickly proliferated. Simultaneously with the diffusion of the mobile devices, mobile applications for those devices also prospered and soon became deeply penetrated in consumers' daily lives. Numerous mobile applications have been released in app stores yielding trillions of cumulative downloads. However, a big majority of the applications are disregarded from consumers. Even after the applications are purchased, they do not survive long in consumers' mobile devices and are soon abandoned. Nevertheless, it is imperative for both app developers and app-store operators to understand consumer behaviors and to develop marketing strategies aiming to make sustainable business by first increasing sales of mobile applications and by also designing surviving strategy for applications. Therefore, this research analyzes consumers' mobile application usage behavior in a frame of substitution/supplementary of application categories and several explanatory variables. Considering that consumers of mobile devices use multiple apps simultaneously, this research adopts multivariate probit models to explain mobile application usage behavior and to derive correlation between categories of applications for observing substitution/supplementary of application use. The research adopts several explanatory variables including sociodemographic data, user experiences of purchased applications that reflect future purchasing behavior of paid applications as well as consumer attitudes toward marketing efforts, variables representing consumer attitudes toward rating of the app and those representing consumer attitudes toward app-store promotion efforts (i.e., top developer badge and editor's choice badge). Results of this study can be explained in hedonic and utilitarian framework. Consumers who use hedonic applications, such as those of game and entertainment-related, are of young age with low education level. However, consumers who are old and have received higher education level prefer utilitarian application category such as life, information etc. There are disputable arguments over whether the users of SNS are hedonic or utilitarian. In our results, consumers who are younger and those with higher education level prefer using SNS category applications, which is in a middle of utilitarian and hedonic results. Also, applications that are directly related to tangible assets, such as banking, stock and mobile shopping, are only negatively related to experience of purchasing of paid app, meaning that consumers who put weights on tangible assets do not prefer buying paid application. Regarding categories, most correlations among categories are significantly positive. This is because someone who spend more time on mobile devices tends to use more applications. Game and entertainment category shows significant and positive correlation; however, there exists significantly negative correlation between game and information, as well as game and e-commerce categories of applications. Meanwhile, categories of game and SNS as well as game and finance have shown no significant correlations. This result clearly shows that mobile application usage behavior is quite clearly distinguishable - that the purpose of using mobile devices are polarized into utilitarian and hedonic purpose. This research proves several arguments that can only be explained by second-hand real data, not by survey data, and offers behavioral explanations of mobile application usage in consumers' perspectives. This research also shows substitution/supplementary patterns of consumer application usage, which then explain consumers' mobile application usage behaviors. However, this research has limitations in some points. Classification of categories itself is disputable, for classification is diverged among several studies. Therefore, there is a possibility of change in results depending on the classification. Lastly, although the data are collected in an individual application level, we reduce its observation into an individual level. Further research will be done to resolve these limitations.

Survey on the distribution of ancient tombs using LiDAR measurement method (라이다(LiDAR) 측량기법을 활용한 고분분포현황 조사)

  • SIM Hyeoncheol
    • Korean Journal of Heritage: History & Science
    • /
    • v.56 no.4
    • /
    • pp.54-70
    • /
    • 2023
  • Surveys and studies on cultural assets using LiDAR measurement are already active overseas. Recently, awareness of the advantages and availability of LiDAR measurement has increased in Korea, and cases of using it for surveys of cultural assets are gradually increasing. However, it is usually restricted to surveys of mountain fortresses and is not actively used for surveys of ancient tombs yet. Therefore, this study intends to emphasize the need to secure fundamental data from LiDAR measurement for the era from the Three Kingdoms to Unified Silla in which recovery, maintenance, etc., in addition to the actual surveys, are unfulfilled due to the sites being mainly distributed in mountainous areas. For this, LiDAR measurement was executed for the area of Jangsan Ancient Tombs and Chunghyo-dong Ancient Tombs in Seoak-dong, Gyeongju, to review the distribution and geographical conditions of ancient tombs. As a result, in the Jangsan Ancient Tombs, in which a precision archaeological (measurement) survey was already executed, detailed geographic information and distribution conditions could be additionally identified, which could not be known only with the layout indicated by the topographic map of the existing report. Also, in the Chunghyo-dong Ancient Tombs, in which an additional survey was not conducted after 10 tombs were found during the Japanese colonial period, the location of the ancient tombs initially excavated was accurately identified, and the status and additional information was acquired, such as on the conditions of ancient tombs not surveyed. Such information may also be used as fundamental data for the preservation and maintenance of future ancient tombs in addition to the survey and study of the ancient tombs themselves. LiDAR measurement is most effective for identifying the condition of ancient tombs in mountainous areas where observation is difficult or access is limited due to the forest zone. It may be executed before on-site surveys, such as archaeological surveys, to secure data with high availability as prior surveys or pre-surveys. Therefore, it is necessary to secure fundamental data from LiDAR measurement in future surveys of ancient tombs and to establish a survey and maintenance/utilization plan based on this. To establish survey/study and preservation/maintenance measures for ancient tombs located in mountainous areas, a precision archaeological survey is currently executed to draw up a distribution chart of ancient tombs. If LiDAR measurement data is secured before this and used, a more effective and accurate distribution chart can be drawn up, and the actual conditions can be identified. Also, most omissions or errors in information can be prevented in on-site surveys of large regions. Therefore, it is necessary to accumulate fundamental data by actively using LiDAR measurement in future surveys of ancient tombs.

A Study on the Impacts of users' Needs for Cognition(NFC) on the Online Brand Community and Brand Loyalty (사용자의 인지욕구 특성이 온라인 커뮤니티 충성도와 브랜드 태도에 미치는 영향에 관한 연구)

  • Lee, Sun-Ro;Cho, Jung-Hyun;Cho, Sung-Min
    • Asia pacific journal of information systems
    • /
    • v.17 no.4
    • /
    • pp.1-29
    • /
    • 2007
  • The brand-based online community recently plays an important roles for consumers to facilitates searching and sharing information among them. Firms often find such a brand community as a critical channel to gain collective intelligence for developing new ideas and products. As a new web platform such as web 2.0 has been introduced, consumers could more easily participate in the new social networks created by sharing mutual value and belief among themselves. Accordingly firms began to recognize potentials of online brand assets and pay attention to the importance of online brand community loyalty. Previous research related to online community tends to focus on identifying the antecedents of community loyalty and their subsequent impacts on brand. They, however, tend to neglect the importance of individual characteristics of online community users. As integrating the fragmented variables with an individual characteristics, therefore, this study reexamined the impacts of interactivity, information, reward, and personalization services provided by an online brand community on the sense of community, community loyalty, and brand attitude. Also, this study investigated how users' individual characteristics(need for cognition: NFC) can play moderating roles among the variables identified in the previous research. A field survey was administrated and 671 valid samples were collected. In order to test the hypothesis we conducted the multi-sample structural equation modeling(MSEM) between two groups(a group with high vs. a group with low level of NFC). Results show that previously identified variables such as interactivity, information, reward, and personalization services have significant effects on the sense of community as previous research demonstrated. Subsequently, the sense of community positively influences the community loyalty and brand attitude. However, when considering the NFC as a moderating variable, we found that the effect of interactivity and reward service on the sense of community was stronger for a group with a lower level of NFC compared to a group with a higher level, while the effect of information providing service on the sense of community was stronger for a group with a higher level of NFC compared to a group with a lower level. This research revealed that NFC can affect the degree of individual perception on the sense of community which has been considered as an important indicator for the community loyalty and brand attitude. Hence, when firms developing customer relation strategy through building an online brand community, they need to reflect customers' NFC and accordingly provide varying degree of interactivity, information, reward, and personalization services.

Study of effectiveness for the network separation policy of financial companies (금융회사 망분리 정책의 효과성 연구)

  • Cho, Byeong-Joo;Yun, Jang-Ho;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.181-195
    • /
    • 2015
  • Financial industries have operated internal and external network with an unified system for continual business process of customers and other organizations in the past. The financial supervising authority requires more technical and managerial protecting policy to financial industries related to the exposure as danger of external attacks or information leakage. Financial industries performed network separation into internal business and external internet networks for protecting IT assets from malware infection accessing internet or hacking attacks and prohibiting leakage of customers' personal and financial information following financial supervising authority and redefine security policy to fit on network separated-condition. In this study, effectiveness for network separation policy was examined on malware inflow and verified that malware inflow in all routes can be blocked by the policy with analyzing operration data of a financial company, estimating network separation. Result of this study proves that malware infection route by portable storages was not completely blocked even on adapting network-separated condition. As a solution for this, efficient security policy would be suggested in this paper as controlling portable storages for maximizing effectiveness of network separation.

A Study on the Modeling Mechanism for Security Risk Analysis in Information Systems (정보시스템에 대한 보안위험분석을 위한 모델링 기법 연구)

  • Kim Injung;Lee Younggyo;Chung Yoonjung;Won Dongho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.989-998
    • /
    • 2005
  • Information systems are today becoming larger and mostly broadband-networked. This exposes them at a higher risk of intrusions and hacking than ever before. Of the technologies developed to meet information system security needs, risk analysis is currently one of the most actively researched areas. Meanwhile, due to the extreme diversity of assets and complexity of network structure, there is a limit to the level of accuracy which can be achieved by an analysis tool in the assessment of risk run by an information system. Also, the results of a risk assessment are most oftennot up-to-date due to the changing nature of security threats. By the time an evaluation and associated set of solutions are ready, the nature and level of vulnerabilities and threats have evolved and increased, making them obsolete. Accordingly, what is needed is a risk analysis tool capable of assessing threats and propagation of damage, at the same time as security solutions are being identified. To do that, the information system must be simplified, and intrusion data must be diagrammed using a modeling technique this paper, we propose a modeling technique information systems to enable security risk analysis, using SPICE and Petri-net, and conduct simulations of risk analysis on a number of case studies.

A Study on the Determinants of Patent Citation Relationships among Companies : MR-QAP Analysis (기업 간 특허인용 관계 결정요인에 관한 연구 : MR-QAP분석)

  • Park, Jun Hyung;Kwahk, Kee-Young;Han, Heejun;Kim, Yunjeong
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.21-37
    • /
    • 2013
  • Recently, as the advent of the knowledge-based society, there are more people getting interested in the intellectual property. Especially, the ICT companies leading the high-tech industry are working hard to strive for systematic management of intellectual property. As we know, the patent information represents the intellectual capital of the company. Also now the quantitative analysis on the continuously accumulated patent information becomes possible. The analysis at various levels becomes also possible by utilizing the patent information, ranging from the patent level to the enterprise level, industrial level and country level. Through the patent information, we can identify the technology status and analyze the impact of the performance. We are also able to find out the flow of the knowledge through the network analysis. By that, we can not only identify the changes in technology, but also predict the direction of the future research. In the field using the network analysis there are two important analyses which utilize the patent citation information; citation indicator analysis utilizing the frequency of the citation and network analysis based on the citation relationships. Furthermore, this study analyzes whether there are any impacts between the size of the company and patent citation relationships. 74 S&P 500 registered companies that provide IT and communication services are selected for this study. In order to determine the relationship of patent citation between the companies, the patent citation in 2009 and 2010 is collected and sociomatrices which show the patent citation relationship between the companies are created. In addition, the companies' total assets are collected as an index of company size. The distance between companies is defined as the absolute value of the difference between the total assets. And simple differences are considered to be described as the hierarchy of the company. The QAP Correlation analysis and MR-QAP analysis is carried out by using the distance and hierarchy between companies, and also the sociomatrices that shows the patent citation in 2009 and 2010. Through the result of QAP Correlation analysis, the patent citation relationship between companies in the 2009's company's patent citation network and the 2010's company's patent citation network shows the highest correlation. In addition, positive correlation is shown in the patent citation relationships between companies and the distance between companies. This is because the patent citation relationship is increased when there is a difference of size between companies. Not only that, negative correlation is found through the analysis using the patent citation relationship between companies and the hierarchy between companies. Relatively it is indicated that there is a high evaluation about the patent of the higher tier companies influenced toward the lower tier companies. MR-QAP analysis is carried out as follow. The sociomatrix that is generated by using the year 2010 patent citation relationship is used as the dependent variable. Additionally the 2009's company's patent citation network and the distance and hierarchy networks between the companies are used as the independent variables. This study performed MR-QAP analysis to find the main factors influencing the patent citation relationship between the companies in 2010. The analysis results show that all independent variables have positively influenced the 2010's patent citation relationship between the companies. In particular, the 2009's patent citation relationship between the companies has the most significant impact on the 2010's, which means that there is consecutiveness regarding the patent citation relationships. Through the result of QAP correlation analysis and MR-QAP analysis, the patent citation relationship between companies is affected by the size of the companies. But the most significant impact is the patent citation relationships that had been done in the past. The reason why we need to maintain the patent citation relationship between companies is it might be important in the use of strategic aspect of the companies to look into relationships to share intellectual property between each other, also seen as an important auxiliary of the partner companies to cooperate with.