• Title/Summary/Keyword: information services

Search Result 18,327, Processing Time 0.043 seconds

An Analysis of the Regulation Limits for Location Based Services (위치기반서비스의 법률적 규제범위 분석)

  • Jin, Heui-Chae;Sun, Yo-Sub;Nam, Kwang-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.1
    • /
    • pp.177-182
    • /
    • 2009
  • Location Based Service(LBS) is various and widely spreading service based on the Location information. Those services are under the control of Privacy Act for Location Information to protect from misusing or overusing of personal location information. In this paper, we analyze a concept and a feature of personal location information and how to use and control the flow of location information by the Location Information Act. As the result of this paper, we expect to use the location information in various fields to develop more efficient service.

  • PDF

A Study on the Factors Affecting Continuous Intention and Expansion of Communication Channels in Social Network Service (소셜네트워크서비스에서 지속사용의도 및 관계채널확장에 영향을 미치는 요인에 관한 연구)

  • Park, Seon-Hwa;Gim, Gwang-Yong
    • Journal of Information Technology Services
    • /
    • v.11 no.2
    • /
    • pp.319-337
    • /
    • 2012
  • To stress the importance of privacy in social networking, I presented an analysis on how information control and information management vulnerability influence trust and privacy concerns in social networking, and how trust and privacy concerns influence the sustainable usage intention of social network services. I also analyzed the factors affecting privacy concerns to present the method to alleviate social network users' concerns about privacy. Information collection control, information processing control and information management vulnerability were chosen and analyzed as the factors affecting privacy concerns. The results showed that information collection control and information management vulnerability significantly affected trust and privacy concerns; and information processing control did not significantly affect privacy concerns. The relationship between trust and privacy concerns, and sustainable usage intention was statistically significant; and the relationship between trust and expansion of communication channels was also statistically significant.

Improvement Direction in Business Information and Information Service System (기업정보관리와 정보서비스체계의 개선방향)

  • 이진영
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.10 no.1
    • /
    • pp.137-161
    • /
    • 1999
  • Business information system should utilize the provided various information services from information resources: namely, the improvement of business information can be achieved by the establishment of an business information center and by the employment of qualified librarians. Therefore. employers may get effective management and operation on theirs business when their adoption of innovative technologies, management strategies and information services are combined together. Especially, the information services they can get through Internet. prompt decision making adoption of new policies, flexible organization of business management and innovation of technology will be the core factors.

  • PDF

A Study on the Development of Curriculum Track for Civil Service Librarian

  • Noh, Younghee
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.3 no.1
    • /
    • pp.31-63
    • /
    • 2013
  • The goal of this study is to improve the competitiveness of professional librarians in society. To this end, we analyzed domestic and international LIS curriculum, determined demand from field librarians through a survey, carried out job analysis by library types, and developed an operating model for LIS curriculum by synthesizing all of these results. Finally, we suggested a course of study for civil service librarians based on this model. As a result, the six required courses for civil service librarians are: Introduction to Library and Information Science, Information Organization, Information Services (Reference and Information Services), Library Management, Information Retrieval, and Field Work. The four core courses for the civil service concentration are: Collection Development, Information Sources by Subjects, Public Library Management, and Digital Libraries. Suggested electives best suited to this career path include Using Web Resources, Information Literacy, Information Services in Culturally Diverse Communities, Library Marketing, Libraries and Cultural Programs, Reading Guidance, Library History, Small Library Management, Studies in Library Buildings, Library Cooperation, Managing Digital Collections, and Information and Communication in a Digital Age.

A Study on Factors Influencing User's Intention for Quality of Medical Information Use on the Web (웹 의료정보 품질이 사용의도에 영향을 미치는 요인)

  • Jeon, Jin-Hwan;Kim, Jong-Ki
    • Journal of Information Technology Services
    • /
    • v.9 no.4
    • /
    • pp.57-70
    • /
    • 2010
  • Nowadays, medical services can be performed through online. This entails a lot of human resources and different healthcare information. The rapid changes in the healthcare environment through web should be accounted so that the information would be maximally useful. However, medical information acquired online is not regulated; it is not favorable to users because it creates doubts to its reliability and benefits. This study focuses on the online medical information. It gives help to the users through its accessibility" comprehensiveness, continuity and efficiency. An empirical analysis of research model using PLS(partial least squares) shows that the quality of medical information influences the reliability and benefit of the related medical information. If users recognize medical information to be reliable and beneficial, their intention to use the medical information becomes strong.

An Enhanced Model on the Selection of Information Protection Security Diagnosis Target Firms (정보보호 안전진단 대상자 선정 기준의 개선 방안 연구)

  • Ahn, Yeon-Shick
    • Journal of Information Technology Services
    • /
    • v.8 no.1
    • /
    • pp.47-58
    • /
    • 2009
  • The information protection security diagnosis institution was applied services since 2004, for the leveling up of public information protection and the establishment of the stability and reliability of information communication. And this security diagnosis was implemented actually on the 142 firms in 2005, the 160 firms in 2006 and the 205 firms in 2007. But this is recognized by the some firms as one of the unnecessary regulations. And there are some difficulties with collecting the subjective and reliable source data for establishing the information protection security diagnosis target. In this research, the enhanced model on the selection of information protection security diagnosis target firms was suggested by the interview with some expert and the analysis for the related actual data. By the model which are introduced from the statistical analysis of the related data and the summary of some expert's suggestions, information protection security diagnosis target can include the information telecommunication service providers taking 5 billion won as sales in a year, and web service providers like as shopping mall site, with the personal records of 2 million subscribers.

Design of Security Model for Service of Company Information (기업 정보화 서비스를 위한 보안 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.2
    • /
    • pp.43-49
    • /
    • 2012
  • Recently, the safety of being processed in a corporate enterprise with a wide range of IT skills applied to the Corporate Affairs information services are increasing requirement. Businesses that are required by various IT corporate information technology services to companies that need to protect information being leaked to other companies, a security incident has been applied and is growing, but is lacking about how to respond to the protection of corporate information services. In this paper, the information that is important in the corporate authority by the user's access control model to reduce the number of security incidents such as information leakage and security services for enterprise informatization is proposed. The proposed model can be used in order to block the access of the users to access information managed by a central administrator role and the rights of users to access information any abnormality has been captured. In addition, the proposed model can take advantage of protecting corporate information from the systematic recovery and operational continuity strategies to build your company's information services.

  • PDF

A Study on the Linkage and Convergence of Academic Information Services in Science and Technology (과학기술 학술정보서비스의 연계 및 융합에 관한 연구)

  • Kim, Dou-Gyun;Choi, Hee-Seok;Lee, Hyejin;Hwang, Yun-Young;Kwak, Seung-Jin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.4
    • /
    • pp.341-359
    • /
    • 2019
  • To improve research productivity, it is important to acquire up-to-date information quickly. To this end, researchers seek information resources through various channels and methods and utilize them in their research and development processes. The Korea Institute of Science and Technology Information (KISTI) has developed a platform for integrated scientific and scientific information service called ScienceOn to provide specialized information, infrastructure resources, industry and technology analysis resources in one place to support the research and information ecosystem. Through this process, accessibility and usability are enhanced through the connection and convergence of various information and services. In this study, we look at recent R&D trends in scientific technology academic information integration services and recommended packaging services that can be utilized in batches according to the purpose of use. We look forward to improving national R&D productivity by strengthening the linkage and convergence of scientific and technological information.

Smart City Framework Based on Geospatial Information Standards (공간정보 표준기반 스마트시티 프레임워크)

  • Eunbi Ko;Guk Sik Jeong;Kyoung Cheol Koo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.2
    • /
    • pp.1-12
    • /
    • 2024
  • Modern cities are actively adopting smart city services to address various urban challenges. Geospatial information acts as the foundational infrastructure of smart cities, promoting the sustainable development of urban areas. Consequently, as the standardization and utilization of geospatial information increase, the efficiency and sustainability of smart city operations improve. To achieve this, collaboration among diverse stakeholders is crucial for delivering optimal smart city services based on geospatial information. This paper defines smart city services, focusing on transportation and building-energy domains, based on the life cycle of geospatial information technology. Emphasis is placed on the importance of applying and utilizing geospatial information standards. Additionally, this paper proposes the Smart City based on Geospatial Information standards (SCGI) framework to provide insights into standardizing smart city services mapped to geospatial information standards. This research suggests a new paradigm for standardizing smart city services using geospatial information standards to offer customized solutions, thereby discussing the future development possibilities of smart cities.

Group Key Management Protocol for Secure Social Network Service (안전한 소셜 네트워크 서비스를 위한 그룹키 관리 프로토콜)

  • Seo, Seung-Hyun;Cho, Tae-Nam
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.3
    • /
    • pp.18-26
    • /
    • 2011
  • Social network services whose users increase rapidly is the online services that reflect social network. They are used for various purposes such as strategy of election, commercial advertisement and marketing, educational information sharing and exchange of medical knowledge and opinions. These services make users form social networks with other users who have common interests and expand their relationships by releasing their personal information and utilizing other users' social networks. However, the social network services based on open and sharing of information raise various security threats such as violation of privacy and phishing. In this paper, we propose a group key management scheme and protocols using key rings to protect communication of small groups in social network services.