• Title/Summary/Keyword: information measures

Search Result 4,728, Processing Time 0.034 seconds

Measures Of Slope Rotatability For Mixture Experiment Designs

  • Ha, Jeong-Cheol
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.3
    • /
    • pp.745-755
    • /
    • 2007
  • The concept of slope rotatability introduced by Hader and Park(1978) is available when we are interested in the difference of the responses. Since there can be constraints on the factor levels in mixture experiments, there arises a need for adaptation of the concept of slope rotatability and the measure to assess it. In this article, measures of slope rotatability in mixture experiments are proposed to quantify the amount of slope rotatability for a given design. Measures for a restricted region design as well as for an unrestricted region design are presented. Then, the designs having different optimalities are compared with respect to these measures by some examples.

  • PDF

Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector

  • Shim, Min-A;Baek, Seung-Jo;Park, Tae-Hyoung;Seol, Jeong-Seon;Lim, Jong-In
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.548-574
    • /
    • 2009
  • Personal information (hereinafter referred to as "PI") infringement has recently emerged as a serious social problem in Korea. PI infringement in the public and private sector is common. There were 182,666 cases of PI in 2,624 public organizations during the last three years. Online infringement cases have increased. PI leakage causes moral and economic damage and is an impediment to public confidence in public organizations seeking to manage e-government and maintain open and aboveboard administration. Thus, it is an important matter. Most cases of PI leakage result from unsatisfactory management of security, errors in home page design and insufficient system protection management. Protection management, such as encryption or management of access logs should be reinforced urgently. However, it is difficult to comprehend the scope of practical technology management satisfied legislation and regulations. Substantial protective countermeasures, such as access control, certification, log management and encryption need to be established. It is hard to deal with the massive leakage of PI and its security management. Therefore, in this study, we analyzed the conditions for the technical protection measures during the processing phase of PI. In addition, we classified the standard control items of protective measures suited to public circumstances. Therefore, this study provides a standard and checklist by which staff in public organizations can protect PI via technical management activities appropriate to laws and ordinances. In addition, this can lead to more detailed and clearer instructions on how to carry out technical protection measures and to evaluate the current status.

Research on the Application of GIS-based Measures in the Advancement of the Construction Project Information System (건설사업정보시스템의 고도화를 위한 공간정보(GIS) 적용방안에 관한 연구)

  • Ok, Hyun;Kim, Seong-Jin
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.70-79
    • /
    • 2015
  • The Construction Project Information System(CPIS), an information system constructed as part of the Construction Continuous Acquisition & Life-cycle Support(CALS) of the Ministry of Land, Infrastructure, and Transport(MOLIT), is designed to digitize construction projects across all stages, and enable sharing of information so as to enhance the productivity and efficiency of construction projects and secure their transparent administration. One of MOLIT's internal work systems, CPIS focuses on work-handling and data management. However, now over 10 years old after its construction, it focuses on text and document-based construction project information, but it cannot be interfaced with the visualization-based GIS, which limits the sharing and dissemination of information and the determination of the overall construction project status. To resolve the existing CPIS limitations and problems and to upgrade the system, this study examined domestic and overseas GIS technology trends and relevant information systems, and analyzed the CPIS status and problems. It thus proposed total GIS application measures to upgrade CPIS. Also, it identified detailed CPIS utilization measures and GIS application measures by unit system, and analyzed considerations for GIS application.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

How Does Corporate Social Responsibility Affect Asymmetric Information: Evidence from Korean Retail Industry

  • Kim, Sang-Su;Lee, Jeong-Hwan
    • Journal of Distribution Science
    • /
    • v.17 no.2
    • /
    • pp.5-11
    • /
    • 2019
  • Purpose - This paper examines how corporate social responsibility of the Korean retail industry affects the degree of asymmetric information. Recent theories predict that a firm's active engagement in socially responsible activities lowers the degree of asymmetric information of the firm. Research design, data, and methodology - This paper uses the sum of environmental and social scores (ES), published by the Korean Corporate Governance Service in order to proxy the degree of socially responsible management practices of Korean retail firms. This paper uses the ordinary least square method to investigate the above predictions. The publicly traded Korea retail firms listed in the Korean Exchange are analyzed from 2011 to 2016. To measure the degree of asymmetric information, this paper adopts the analyst dispersion and price impact measures. Results - This paper shows that the ES score has significantly positive relationships with these two measures of information asymmetry. The environmental score seems to increase the analyst dispersion measure and the social score appears to raise the price impact measure mores significantly. Conclusions - The results do not support the prior theory expecting a negative relationship between corporate social responsibility and the degree of asymmetric information. Environmental and social scores are found to affect the measures of information asymmetry differently.

A Study on the Role and Security Enhancement of the Expert Data Processing Agency: Focusing on a Comparison of Data Brokers in Vermont (데이터처리전문기관의 역할 및 보안 강화방안 연구: 버몬트주 데이터브로커 비교를 중심으로)

  • Soo Han Kim;Hun Yeong Kwon
    • Journal of Information Technology Services
    • /
    • v.22 no.3
    • /
    • pp.29-47
    • /
    • 2023
  • With the recent advancement of information and communication technologies such as artificial intelligence, big data, cloud computing, and 5G, data is being produced and digitized in unprecedented amounts. As a result, data has emerged as a critical resource for the future economy, and overseas countries have been revising laws for data protection and utilization. In Korea, the 'Data 3 Act' was revised in 2020 to introduce institutional measures that classify personal information, pseudonymized information, and anonymous information for research, statistics, and preservation of public records. Among them, it is expected to increase the added value of data by combining pseudonymized personal information, and to this end, "the Expert Data Combination Agency" and "the Expert Data Agency" (hereinafter referred to as the Expert Data Processing Agency) system were introduced. In comparison to these domestic systems, we would like to analyze similar overseas systems, and it was recently confirmed that the Vermont government in the United States enacted the first "Data Broker Act" in the United States as a measure to protect personal information held by data brokers. In this study, we aim to compare and analyze the roles and functions of the "Expert Data Processing Agency" and "Data Broker," and to identify differences in designated standards, security measures, etc., in order to present ways to contribute to the activation of the data economy and enhance information protection.

A Study on the Effects of the Characteristics of Performance Measures on the Acceptance of Evaluation (성과지표 특성이 평가의 수용성에 미치는 영향에 관한 연구)

  • Choi, Hyoung-Sub;Seo, Hyun-Sik;Oh, Jay-In
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.2
    • /
    • pp.99-120
    • /
    • 2009
  • The relationship between the performance measures and the acceptance of evaluation has been of importance not only in the academic field but in the business area. However, there had not been many studies on the factors which affect the goal core, that is, specificity and difficulty. The previous literature on the evaluation of measures has limitations in that the common and unique measures without suggesting the concept of shared measures are used. Thus, the purpose of this study is to examine the effects of the environmental characteristics of the goal setting on the result and acceptance of the evaluation, which is mediated by the characteristics of the goal core. This study further tests if there are any moderating effects from using the shared measures of performance.

  • PDF

The Suitable Types and Measures of Wildlife Crossing Structures for Mammals of Korea (국내 포유동물에 적합한 생태통로의 유형과 규격)

  • Choi, Tae Young;Yang, Byeong Gug;Woo, Dong Geol
    • Journal of Environmental Impact Assessment
    • /
    • v.21 no.1
    • /
    • pp.209-218
    • /
    • 2012
  • In this study, suitable types and measures of Wildlife Crossing Structures (WCS) for mammals of Korea were analyzed to suggest basic information for design guidelines of WCS. In order to find the types and measures, we conducted field surveys on 79 WCS and literature reviews on 159 WCS. The results of our study were as follows; Small-medium sized carnivores usually use all measures of wildlife underpass, meanwhile large sized herbivores as water deer need lager measures than 0.7 Openness Index(OI). Furthermore, we found that wildlife overpasses were usually used at the measure of 6.8 m width by every mammal. Therefore, we concluded that the proper measures should be lager than 0.7 OI for underpass and 7 m width for overpass.

PROJECTIONS AND SLICES OF MEASURES

  • Selmi, Bilel;Svetova, Nina
    • Communications of the Korean Mathematical Society
    • /
    • v.36 no.2
    • /
    • pp.327-342
    • /
    • 2021
  • We consider a generalization of the Lq-spectrum with respect to two Borel probability measures on ℝn having the same compact support, and also study their behavior under orthogonal projections of measures onto an m-dimensional subspace. In particular, we try to improve the main result of Bahroun and Bhouri [4]. In addition, we are interested in studying the behavior of the generalized lower and upper Lq-spectrum with respect to two measures on "sliced" measures in an (n - m)-dimensional linear subspace. The results in this article establish relations with the Lq-spectrum with respect to two Borel probability measures and its projections and generalize some well-known results.

Effect of Market Basket Size on the Accuracy of Association Rule Measures (장바구니 크기가 연관규칙 척도의 정확성에 미치는 영향)

  • Kim, Nam-Gyu
    • Asia pacific journal of information systems
    • /
    • v.18 no.2
    • /
    • pp.95-114
    • /
    • 2008
  • Recent interests in data mining result from the expansion of the amount of business data and the growing business needs for extracting valuable knowledge from the data and then utilizing it for decision making process. In particular, recent advances in association rule mining techniques enable us to acquire knowledge concerning sales patterns among individual items from the voluminous transactional data. Certainly, one of the major purposes of association rule mining is to utilize acquired knowledge in providing marketing strategies such as cross-selling, sales promotion, and shelf-space allocation. In spite of the potential applicability of association rule mining, unfortunately, it is not often the case that the marketing mix acquired from data mining leads to the realized profit. The main difficulty of mining-based profit realization can be found in the fact that tremendous numbers of patterns are discovered by the association rule mining. Due to the many patterns, data mining experts should perform additional mining of the results of initial mining in order to extract only actionable and profitable knowledge, which exhausts much time and costs. In the literature, a number of interestingness measures have been devised for estimating discovered patterns. Most of the measures can be directly calculated from what is known as a contingency table, which summarizes the sales frequencies of exclusive items or itemsets. A contingency table can provide brief insights into the relationship between two or more itemsets of concern. However, it is important to note that some useful information concerning sales transactions may be lost when a contingency table is constructed. For instance, information regarding the size of each market basket(i.e., the number of items in each transaction) cannot be described in a contingency table. It is natural that a larger basket has a tendency to consist of more sales patterns. Therefore, if two itemsets are sold together in a very large basket, it can be expected that the basket contains two or more patterns and that the two itemsets belong to mutually different patterns. Therefore, we should classify frequent itemset into two categories, inter-pattern co-occurrence and intra-pattern co-occurrence, and investigate the effect of the market basket size on the two categories. This notion implies that any interestingness measures for association rules should consider not only the total frequency of target itemsets but also the size of each basket. There have been many attempts on analyzing various interestingness measures in the literature. Most of them have conducted qualitative comparison among various measures. The studies proposed desirable properties of interestingness measures and then surveyed how many properties are obeyed by each measure. However, relatively few attentions have been made on evaluating how well the patterns discovered by each measure are regarded to be valuable in the real world. In this paper, attempts are made to propose two notions regarding association rule measures. First, a quantitative criterion for estimating accuracy of association rule measures is presented. According to this criterion, a measure can be considered to be accurate if it assigns high scores to meaningful patterns that actually exist and low scores to arbitrary patterns that co-occur by coincidence. Next, complementary measures are presented to improve the accuracy of traditional association rule measures. By adopting the factor of market basket size, the devised measures attempt to discriminate the co-occurrence of itemsets in a small basket from another co-occurrence in a large basket. Intensive computer simulations under various workloads were performed in order to analyze the accuracy of various interestingness measures including traditional measures and the proposed measures.