• Title/Summary/Keyword: information measures

Search Result 4,728, Processing Time 0.028 seconds

A Study on the Frequency Level Preference Tendency of Association Measures (연관성 척도의 빈도수준 선호경향에 대한 연구)

  • Lee, Jae-Yun
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.4 s.54
    • /
    • pp.281-294
    • /
    • 2004
  • Association measures are applied to various applications, including information retrieval and data mining. Each association measure is subject to a close examination to its tendency to prefer high or low frequency level because it has a significant impact on the performance of applications. This paper examines the frequency level preference(FLP) tendency of some popular association measures using artificially generated cooccurrence data, and evaluates the results. After that, a method of how to adjust the FLP tendency of major association measures such as cosine coefficient is proposed. This method is tested on the cooccurrence-based query expansion in information retrieval and the result can be regarded as promising the usefulness of the method. Based on these results of analysis and experiment, implications for related disciplines are identified.

A Comparative Analysis of Balanced Scorecard Performance Measures Based on Business Strategy (기업 전략에 따른 균형성과표 성과지표 비교분석)

  • Sohn, Myung-Ho;Kim, Jae-Gu;You, Tae-Woo;Rhim, Ho-Sun;Lee, Hee-Seok
    • Asia pacific journal of information systems
    • /
    • v.13 no.1
    • /
    • pp.1-22
    • /
    • 2003
  • This study describes how the weights of performance measures varies depending on business strategy types, such as defenders, prospectors, analyzers, and reactors. A Balanced Scorecard has been widely used for measuring a corporate performance to incorporate financial and non-financial measures simultaneously. Because such performance measurements are related to the compensation and promotion of employees, research of weights of performance measures would be instrumental. Our test results demonstrate that the weights of the business performance measures differ in the four perspectives-financial, customer, internal process, and learning and growth. Furthermore, there is evidence that the weights of performance measures vary depending on business strategy. Our study results can be used for enhancing the quality of performance measurement systems.

Measures of Reliability, Maintainability and Availability in Information Technology Service Management (IT 서비스 관리에서 신뢰성, 보전성 및 가용성 척도)

  • Choi, Sung-Woon
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.4
    • /
    • pp.159-163
    • /
    • 2008
  • This paper proposes various measures of reliability, maintainability and availability in information technology service management(ISTM). Global ITSM standards such as ITIL(IT Infrastructure Library) and ISO/IEC 20000 are introduced. Especially availability management of De-facto and De-juire standards is concerned with users and customers of IT service. The study presents seven reliability measures, six maintainability measures and two availability measures. These results can be effectively used with a appropriate IT availability management tools such as CFIA(Component Failure Impact Analysis) and SOA(Service Outage Analysis), etc.

On the Application of Public Search Measures to Detect and Obtain Information

  • Kozytska, Olena;Tsilmak, Olena;Protsenko, Olena;Yankovyi, Mykola;Lysenko, Аndrii;Shulzhenko, Assol
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.109-112
    • /
    • 2021
  • The article considers the state of legislation that regulates the use of public methods of obtaining information by authorized state bodies. The correlation of public investigative (search) actions with operative-search measures as concepts denoting the application of public methods of obtaining information has been studied. In addition, it argues the need for more detailed delineation and legislative regulation of public investigative (search) actions and operational and investigative measures at the legislative and departmental levels. The purpose of the article is to analyze certain provisions of the Law of Ukraine "On operational and investigative activities" to identify inconsistencies in the content of the text of the law in order to correct and prevent ambiguity in the theory and practice of law enforcement.

A Comparison Study on the Weighted Network Centrality Measures of tnet and WNET (tnet과 WNET의 가중 네트워크 중심성 지수 비교 연구)

  • Lee, Jae Yun
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.4
    • /
    • pp.241-264
    • /
    • 2013
  • This study compared and analyzed weighted network centrality measures supported by Opsahl's tnet and Lee's WNET, which are free softwares for weighted network analysis. Three node centrality measures including weighted degree, weighted closeness, and weighted betweenness are supported by tnet, and four node centrality measures including nearest neighbor centrality, mean association, mean profile association, triangle betweenness centrality are supported by WNET. An experimental analysis carried out on artificial network data showed tnet's high sensitiveness on linear transformations of link weights, however, WNET's centrality measures were insensitive to linear transformations. Seven centrality measures from both tools, tnet and WNET, were calculated on six real network datasets. The results showed the characteristics of weighted network centrality measures of tnet and WNET, and the relationships between them were also discussed.

GENERALIZED 'USEFUL' INFORMATION GENERATING FUNCTIONS

  • Hooda, D.S.;Sharma, D.K.
    • Journal of applied mathematics & informatics
    • /
    • v.27 no.3_4
    • /
    • pp.591-601
    • /
    • 2009
  • In the present paper, one new generalized 'useful' information generating function and two new relative 'useful' information generating functions have been defined with their particular and limiting cases. It is interesting to note that differentiations of these information generating functions at t=0 or t=1 give some known and unknown generalized measures of useful information and 'useful' relative information. The information generating functions facilitates to compute various measures and that has been illustrated by applying these information generating functions for Uniform, Geometric and Exponential probability distributions.

  • PDF

An Empirical Study on Influencing Factors of Using Information Security Technology (정보보안기술 사용의 영향요인에 관한 실증적 연구)

  • Kim, Sang-Hoon;Lee, Gab-Su
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.151-175
    • /
    • 2015
  • Although three types of the information security measures (technical, physical and managerial ones) are all together critical to maintaining information security in the organizations and should be implemented at the same time, this study aims at providing theoretical basis of establishing and implementing effective managerial security measures. The rationale behind this research objective is that it is very important to effectively perform the managerial security measures to achieve the target performance level of the technical and the physical security measures because main agents of practicing the information security measures in the organizations are staff members even though the technical and the physical ones are well constructed and implemented. In particular, this study intends to develop and propose the theoretical model applicable to providing the way of improving organizational members' intention to use information security technologies since the very intention to use them is essential to effectively establishing and promoting managerial security measures. In order to achieve the objective of this study, the factors critical to influencing upon the intention to use information security technologies are derived through systematically reviewing related theories and previous studies, and then the research model and hypotheses are proposed by logically reasoning the casual relationship among the these factors. Also, the empirical analyses are performed by conducting the survey of the organization members of domestic large companies and analyzing the structural equation model by PLS (Partial Least Squares) method. The significant results of this study can contribute to expanding the research area of managerial information security and can be applied to suggesting the practical guidelines for effectively establishing and implementing the managerial security measures in various organizations.

Selection of Detection Measures for Malicious Codes using Naive Estimator (단순 추정량을 이용한 악성코드의 탐지척도 선정)

  • Mun, Gil-Jong;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.97-105
    • /
    • 2008
  • The various mutations of the malicious codes are fast generated on the network. Also the behaviors of them become intelligent and the damage becomes larger step by step. In this paper, we suggest the method to select the useful measures for the detection of the codes. The method has the advantage of shortening the detection time by using header data without payloads and uses connection data that are composed of TCP/IP packets, and much information of each connection makes use of the measures. A naive estimator is applied to the probability distribution that are calculated by the histogram estimator to select the specific measures among 80 measures for the useful detection. The useful measures are then selected by using relative entropy. This method solves the problem that is to misclassify the measure values. We present the usefulness of the proposed method through the result of the detection experiment using the detection patterns based on the selected measures.

A Study on Personal Information Protection amid the COVID-19 Pandemic

  • Kim, Min Woo;Kim, Il Hwan;Kim, Jaehyoun;Ha, Oh Jeong;Chang, Jinsook;Park, Sangdon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4062-4080
    • /
    • 2022
  • COVID-19, a highly infectious disease, has affected the globe tremendously since its outbreak during late 2019 in Wuhan, China. In order to respond to the pandemic, governments around the world introduced a variety of public health measures including contact-tracing, a method to identify individuals who may have come into contact with a confirmed COVID-19 patient, which usually leads to quarantine of certain individuals. Like many other governments, the South Korean health authorities adopted public health measures using latest data technologies. Key data technology-based quarantine measures include:(1) Electronic Entry Log; (2) Self-check App; and (3) COVID-19 Wristband, and heavily relied on individual's personal information for contact-tracing and self-isolation. In fact, during the early stages of the pandemic, South Korea's strategy proved to be highly effective in containing the spread of coronavirus while other countries suffered significantly from the surge of COVID-19 patients. However, while the South Korean COVID-19 policy was hailed as a success, it must be noted that the government achieved this by collecting and processing a wide range of personal information. In collecting and processing personal information, the data minimum principle - one of the widely recognized common data principles between different data protection laws - should be applied. Public health measures have no exceptions, and it is even more crucial when government activities are involved. In this study, we provide an analysis of how the governments around the world reacted to the COVID-19 pandemic and evaluate whether the South Korean government's digital quarantine measures ensured the protection of its citizen's right to privacy.