• Title/Summary/Keyword: information measures

Search Result 4,728, Processing Time 0.034 seconds

Correlation Measure for Big Data (빅데이터에서의 상관성 측도)

  • Jeong, Hai Sung
    • Journal of Applied Reliability
    • /
    • v.18 no.3
    • /
    • pp.208-212
    • /
    • 2018
  • Purpose: The three Vs of volume, velocity and variety are commonly used to characterize different aspects of Big Data. Volume refers to the amount of data, variety refers to the number of types of data and velocity refers to the speed of data processing. According to these characteristics, the size of Big Data varies rapidly, some data buckets will contain outliers, and buckets might have different sizes. Correlation plays a big role in Big Data. We need something better than usual correlation measures. Methods: The correlation measures offered by traditional statistics are compared. And conditions to meet the characteristics of Big Data are suggested. Finally the correlation measure that satisfies the suggested conditions is recommended. Results: Mutual Information satisfies the suggested conditions. Conclusion: This article builds on traditional correlation measures to analyze the co-relation between two variables. The conditions for correlation measures to meet the characteristics of Big Data are suggested. The correlation measure that satisfies these conditions is recommended. It is Mutual Information.

Security Measures by Diagnosing Vulnerabilities in Web Applications

  • Kim, Hee Wan
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.22-29
    • /
    • 2021
  • For web application vulnerability diagnosis, from the development stage to the operation stage, it is possible to stably operate the web only when there is a policy that is commonly applied to each task through diagnosis of vulnerabilities, removal of vulnerabilities, and rapid recovery from web page damage. KISA presents 28 evaluation items for technical vulnerability analysis of major information and communication infrastructure. In this paper, we diagnose the vulnerabilities in the automobile goods shopping mall website and suggest security measures according to the vulnerabilities. As a result of diagnosing 28 items, major vulnerabilities were found in three items: cross-site scripting, cross-site request tampering, and insufficient session expiration. Cookie values were exposed on the bulletin board, and personal information was exposed in the parameter values related to passwords when personal information was edited. Also, since the session end time is not set, it was confirmed that session reuse is always possible. By suggesting security measures according to these vulnerabilities, the discovered security threats were eliminated, and it was possible to prevent breaches in web applications and secure the stability of web services.

On the Use of Legal Measures to entice Participation in Online Dispute Resolution System (ODR 시스템으로의 사용자 참여유인을 위한 법적 장치의 활용)

  • Kim, Sun-Kwang
    • International Commerce and Information Review
    • /
    • v.10 no.1
    • /
    • pp.279-293
    • /
    • 2008
  • The number of participants in an online dispute resolution(ODR) system is crucial to its survival. Securing participation is nonetheless difficult. Clearly, it is important to offer a system that is fair, transparent and offers an efficient service at low cost. These factors are fundamental to ensure trust and to build a returning customer base to the system, but are not what attracts a party to submit a dispute for settlement. This paper describes and discusses four main categories of legal measures found in the online dispute resolution services offered by SquareTrade and WIPO. In spite of shortcomings in the offered, the legal measures have contributed to attract large numbers of participants. Large participation secures the long-term economic viability of an online dispute resolution system. The four categories of legal measures described and discussed in this paper need to be part of the specifications and the design and development of future ODR system.

  • PDF

The Development of R&D SEA Measures in National R&D Programs Evaluation (국가연구개발사업의 성과평가를 위한 SEA 측정치 개발)

  • 이종식
    • Proceedings of the Technology Innovation Conference
    • /
    • 1997.07a
    • /
    • pp.247-265
    • /
    • 1997
  • The objectives of not-for-profit organizations including government supported research institutes are, by definition, to achieve socially desired nonfinancial goals. Current reporting focuses on providing information to meet the needs of users. This information may be provided in the annual research report, financial report, and other reports. An objective of current reporting is to provide users with information that will assist them in evaluating the performance(efficiency and effectiveness) of reporting entity. The evaluation of R&D project's performance requires information not only about the acquition and use of resources, but also about the outputs and outcomes of R&D activities, This study aims to recommend that R&D Service Efforts and Accomplish- mints(SEA) reporting is useful for performance evaluation in national R&D programmes. To achieve this aims, I attempt to develop the R&D SEA measures with reference to the Concepts Statement No. 2 of the Governmental Accounting Standards Board. R&D SEA measures consist of five categories : (1) input measures, (2) outcome measures, (3) output measures, (4) re1a1e efforts to accomplishments, (5) explanatory information.

  • PDF

On the Categorical Variable Clustering

  • Kim, Dae-Hak
    • Journal of the Korean Data and Information Science Society
    • /
    • v.7 no.2
    • /
    • pp.219-226
    • /
    • 1996
  • Basic objective in cluster analysis is to discover natural groupings of items or variables. In general, variable clustering was conducted based on some similarity measures between variables which have binary characteristics. We propose a variable clustering method when variables have more categories ordered in some sense. We also consider some measures of association as a similarity between variables. Numerical example is included.

  • PDF

Effects of curvature on leverage in nonlinear regression

  • Kahng, Myung-Wook
    • Journal of the Korean Data and Information Science Society
    • /
    • v.20 no.5
    • /
    • pp.913-917
    • /
    • 2009
  • The measures of leverage in linear regression has been extended to nonlinear regression models. We consider several curvature measures of nonlinearity in an estimation situation. The relationship between measures of leverage and statistical curvature are explored in nonlinear regression models. The circumstances under which the Jacobian leverage reduces to a tangent plane leverage are discussed in connection with the effective residual curvature of the nonlinear model.

  • PDF

Learning City Performance Measurement and Performance Measure Weighting Decision based on DEA Method (DEA를 활용한 성과평가 지표의 가중치 결정모형 구축 : 평생학습도시 성과평가 지표 적용 사례를 중심으로)

  • Lim, Hwan;Sohn, Myung-Ho
    • Journal of Information Technology Services
    • /
    • v.9 no.4
    • /
    • pp.109-121
    • /
    • 2010
  • Most organizations adopt their own performance measurement systems. Those organizations select performance measures to meet their goals. Organizations can give only limited description of what performance measures are. Kaplan and Norton suggest that the Balanced Scorecard (BSC) to complement the conventional performance measures. The BSC can provide management system with a comprehensive strategic vision and integrates non-financial measures with financial measures. The BSC is widely used for measuring corporate performance. This paper investigates how the BSC-based performance measures can be applied to Learning City. The Learning City's performance measures and strategy map on the basis of the BSC are suggested in this research. This paper adopt the AR(assurance region)-DEA model which could limit the range of weight on performance measures to prevent each viewpoint of BSC from having unlimited elasticity. The proposed model is based on CCR model including a property of unit invariance to use the data without normalization process.

APPLICATIONS OF SIMILARITY MEASURES FOR PYTHAGOREAN FUZZY SETS BASED ON SINE FUNCTION IN DECISION-MAKING PROBLEMS

  • ARORA, H.D.;NAITHANI, ANJALI
    • Journal of applied mathematics & informatics
    • /
    • v.40 no.5_6
    • /
    • pp.897-914
    • /
    • 2022
  • Pythagorean fuzzy sets (PFSs) are capable of modelling information with more uncertainties in decision-making problems. The essential feature of PFSs is that they are described by three parameters: membership function, non-membership function and hesitant margin, with the total of the squares of each parameter equal to one. The purpose of this article is to suggest some new similarity measures and weighted similarity measures for PFSs. Numerical computations have been carried out to validate our proposed measures. Applications of these measures have been applied to some real-life decision-making problems of pattern detection and medicinal investigations. Moreover, a descriptive illustration is employed to compare the results of the proposed measures with the existing analogous similarity measures to show their effectiveness.

Survey on Personal Information Encryption Technology (개인정보 암호화 기술에 관한 연구)

  • Kim, Ji Hyun;Lee, Dong Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.769-772
    • /
    • 2012
  • Personal Information Article2 defines personal authentication information, secret information, bio information for personal information and it is stipulated under article29 that the one who have duties must take adequate technological, administrative, physical measures to prevent from illegal reading and sneaking. Also it is stipulated under information communication network law28(1), enforcement regulation9, Korea Communications Commitee notice. To satisfy this, the one who have to take security actions of personal information are required to take technological measures and establish positive measures to continuously manage it.The insurance of technological security is possible by encryption of personal information, secure management and operation of encryption key,taking personal information security level of providin access control of personal information reading and audit.In this paper, we will analyze various technologies of personal information encryption which are essencial component in technological security measuresof personal information. This paper will help choose which technological measures you should take in personal information security.

  • PDF

An Analysis on the Importance and Performance of Personal Information Protection for the Elderly Welfare Center Employees

  • You, Gil-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.185-191
    • /
    • 2018
  • The purpose of this study is to present effective basic data for business management through analysis of importance and performance of personal information protection of the elderly welfare center workers. For this purpose, the questionnaire on the protection of personal information was reconstructed based on the diagnostic level of the personal information security management level of the public institution and the questionnaire was conducted on 105 employees of the elderly welfare center in Chungbuk area. Based on the responses to the importance and the degree of performance of the personal information protection of the elderly welfare center employees, technical statistics and corresponding sample T-tests were conducted and the importance-performance analysis (IPA) was used. Followings are the results of this study: First, there is a statistically significant difference between the importance and the implementation of the management system for the protection of personal information of the workers in the elderly welfare center, establishment and implementation of protection measures, establishment and implementation of infringement measures. Second, IPA analysis on the protection of personal information of the workers in the elderly welfare center shows that the establishment and implementation of protection measures are the areas to maintain good performance. Third, in IPA analysis of the sub-factors of the personal information protection of the workers in the welfare center of the elderly, in the construction and management of the management system, in performing the role of the personal information protection officer and establishing and implementing protection measures, The factors of prevention of information disclosure and exposure and the safe use and management of personal information processing system were analyzed as areas requiring intensive improvement. This study is meaningful as a basic research that can raise the awareness of the personal information protection of the workers in the elderly welfare center and induce the improvement of the related work.