• Title/Summary/Keyword: information theory

Search Result 7,465, Processing Time 0.034 seconds

Classification of Rural Villages Using Information Theory (정보이론을 이용한 농촌마을 권역화 연구)

  • Lee, Ji-Min;Lee, Jeong-Jae
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.49 no.1
    • /
    • pp.23-33
    • /
    • 2007
  • Classification results of rural villages provide useful information about rural village characteristics to select similar villages in rural development project; many researches about regional classification have been practiced. Recently rural amenity was introduced as an alternative for rural development, and rural villages have been surveyed to find potential resources for rural development by 'Rural Amenity Resources Survey Project'. Accumulated information through this survey project could be used to classify rural villages. However existing rural classification method using statistical data is not efficient method to use rural amenity resources information described with text. We introduced Information Bottleneck Method (IBM) based on information theory and implemented this method to classification with rural amenity resources information of Yanggang-myen, Yeongdong-gun in Chungbuk province.

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium

  • Liu, Liang;Huang, Cheng;Fang, Yong;Wang, Zhenxue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.5260-5275
    • /
    • 2019
  • In the process of constructing the traditional offensive and defensive game theory model, these are some shortages for considering the dynamic change of security risk problem. By analysing the critical indicators of the incomplete information game theory model, incomplete information attack and defense game theory model and the mathematical engineering method for solving Bayes-Nash equilibrium, the risk-averse income function for information assets is summarized as the problem of maximising the return of the equilibrium point. To obtain the functional relationship between the optimal strategy combination of the offense and defense and the information asset security probability and risk probability. At the same time, the offensive and defensive examples are used to visually analyse and demonstrate the incomplete information game and the Harsanyi conversion method. First, the incomplete information game and the Harsanyi conversion problem is discussed through the attack and defense examples and using the game tree. Then the strategy expression of incomplete information static game and the engineering mathematics method of Bayes-Nash equilibrium are given. After that, it focuses on the offensive and defensive game problem of unsafe information network based on risk aversion. The problem of attack and defense is obtained by the issue of maximizing utility, and then the Bayes-Nash equilibrium of offense and defense game is carried out around the security risk of assets. Finally, the application model in network security penetration and defense is analyzed by designing a simulation example of attack and defense penetration. The analysis results show that the constructed income function model is feasible and practical.

A Study on Cutural Capital Influencing Organization Performance

  • Yookyung Kim;Myoenggil Choi
    • Journal of Information Technology Applications and Management
    • /
    • v.29 no.6
    • /
    • pp.95-122
    • /
    • 2022
  • The rapid development of technology, the spread of information, and the implementation of the government's start-up support policy exponentially increase the number of start-up companies. The purpose of this study is to investigate each company's cultural capital's effect on organization performance by promoting knowledge management activities and forming organization habitus based on Cultural Reproduction Theory and Cultural Mobility Theory. As a result of the study, it confirmed that the relationship between cultural capital, knowledge management activities, habitus, and organization performance was significant. The results of this study have academic implications as follows: First, the field of research has expanded by studying the effects of cultural capital on business administration, which is less active than existing education and sociology. Second, it accepts and supports Cultural Reproduction Theory and Cultural Mobility Theory from different perspectives.

A Study on the Information Privacy Concerns in Social Log-in Service

  • Kim, Yujin;Lee, Hyung-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.1
    • /
    • pp.193-200
    • /
    • 2022
  • In this paper, we examined the causes of privacy concerns and related factors in social log-in services. On the basis of the 'principal-agent theory,' we established factors such as perceived information asymmetry and fear of seller opportunism affecting information privacy concern of social log-in services users. In addition, we analyzed the relationship between the information privacy concern and intention to use on the basis of the 'privacy calculus theory'. The results of the study showed that (1) fear of seller opportunism had the significant effect on information privacy concerns, (2) information privacy concerns had the significant effect on perceived risk, (3) in accordance with the privacy calculus theory, perceived risk had the negative effect on intention to use, while perceived benefit had the positive effect on intention to use. The findings of the study are expected to help to improve the social log-in service firms' understanding for customers' information privacy protection behaviors.

Antecedents and Consequences of Flow Experience in Online Movie Information Sharing Behavior: An Empirical Study of Young Chinese Moviegoers Living in Korea

  • Zhu, Zong-yi;Kim, Hyeon-Cheol
    • International journal of advanced smart convergence
    • /
    • v.9 no.1
    • /
    • pp.141-153
    • /
    • 2020
  • This study aims to understand the antecedents and consequences of flow experience in online movie information sharing behavior of young Chinese moviegoers residing in Korea to explore a potential market. We followed the Stimulus-Organism-Response (S-O-R) theory and flow theory approaches for developing measures of constructs and investigated previous related studies. This study collected 186 data from Chinses students who attend Korean university. Statistical analysis revealed that information seeking behavior and telepresence are related to online flow experience. In addition, the online flow experience affected consumer satisfaction and information sharing behavior. Flow experience also has been predicted the mediation effect between stimulus information seeking behavior, telepresence and satisfaction and information sharing behavior. Our research findings offer insights for marketers in the movie distribution business who are interested in a better understanding of the behaviors of Chinese moviegoers residing in Korea

The Human Brain and Information Science: Lessons from Popular Neuroscience

  • Sturges, Paul
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.3 no.1
    • /
    • pp.19-29
    • /
    • 2013
  • Insights from the recent wealth of popular books on neuroscience are offered to suggest a strengthening of theory in information science. Information theory has traditionally neglected the human dimension in favour of 'scientific' theory often derived from the Shannon-Weaver model. Neuroscientists argue in excitingly fresh ways from the evidence of case studies, non-intrusive experimentation and the measurements that can be obtained from technologies that include electroencephalography, positron emission tomography (PET), functional magnetic resonance imaging (fMRI), and magnetoencephalography (MEG). The way in which the findings of neuroscience intersect with ideas such as those of Kahneman on fast and slow thinking and Csikszentmihalyi on flow, is tentatively explored as lines of connection with information science. It is argued that the beginnings of a theoretical underpinning for current web-based information searching in relation to established information retrieval methods can be drawn from this.

A Study of Indonesian Online Marketplace: Information Processing Theory Paradigm

  • TEOFILUS, Teofilus;SUTRISNO, Timotius F.C.W.;HONGDIYANTO, Charly;WANANDA, Veronica
    • Journal of Distribution Science
    • /
    • v.18 no.8
    • /
    • pp.75-87
    • /
    • 2020
  • Purpose: This study uses the protection motivation theory and information processing theory to discuss the high number of fraud phenomenon in Indonesia which causes worries to the internet users. The second problem is the large amount of information transparency in e-commerce which actually hinders the users in making decisions so it causes a negative behavior pattern, namely discontinue usage intention. Design/methodology: Therefore, this research hopes to provide insight to the online or e-commerce business community, especially for Tokopedia, to develop its business from understanding the factors influencing consumer attitude when shopping online. The sample are students from Universitas Indonesia, Institut Teknologi Bandung, Institut Pertanian Bogor, Universitas Gadjah Mada and Institut Teknologi Surabaya, with total 900 respondents. Result: The results of this research indicate that ubiquitous connectivity (UC) variable significantly affects variables such as the privacy concern (PC), information transparency (IT) and information overload (IO). PC and IO variables also significantly affect Discontinue Usage Intention (DUI). Conclusion: This study gives a new perspective that despite the phenomenon, the millennial generation especially are not entirely concerned about the privacy concern, however, this study clearly shows that the privacy issue in the digital word continues to be something that needs to be cared for.

A Novel Kernel SVM Algorithm with Game Theory for Network Intrusion Detection

  • Liu, Yufei;Pi, Dechang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.4043-4060
    • /
    • 2017
  • Network Intrusion Detection (NID), an important topic in the field of information security, can be viewed as a pattern recognition problem. The existing pattern recognition methods can achieve a good performance when the number of training samples is large enough. However, modern network attacks are diverse and constantly updated, and the training samples have much smaller size. Furthermore, to improve the learning ability of SVM, the research of kernel functions mainly focus on the selection, construction and improvement of kernel functions. Nonetheless, in practice, there are no theories to solve the problem of the construction of kernel functions perfectly. In this paper, we effectively integrate the advantages of the radial basis function kernel and the polynomial kernel on the notion of the game theory and propose a novel kernel SVM algorithm with game theory for NID, called GTNID-SVM. The basic idea is to exploit the game theory in NID to get a SVM classifier with better learning ability and generalization performance. To the best of our knowledge, GTNID-SVM is the first algorithm that studies ensemble kernel function with game theory in NID. We conduct empirical studies on the DARPA dataset, and the results demonstrate that the proposed approach is feasible and more effective.

Are Online and Offline Delinquency Mutually Exclusive? Blurred Boundaries between Cyber Space and the Real-World

  • Ko, Nayoung;Hong, Myeonggi;Hwang, Jeeseon;Chang, Jeonghyeon;Hwang, EuiGab
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.3048-3067
    • /
    • 2021
  • This study examines the similarities and differences between the causes of juvenile delinquency in online and offline environments and in personal characteristics. The study utilizes data from the '2014 Survey on Juvenile Victimization in Korea'. The population of this survey is students attending middle and high schools across the country. While this paper is based on the Self-Control theory, opportunity factors based on the Routine Activity theory and the Situational Action theory are also applied. Results show that the causes of offline delinquency are low self-control, routine activity and frequent gaming and SNS use. The causes of online delinquency are high self-control, existence of communication with unknown persons and the spectrum of personal information online. The common element of offline and online delinquency was the presence of delinquent peers. These results show that while online and offline delinquency cannot be explained with the same methodology, at the same time they are not mutually exclusive.

A Study on Factors Influencing Privacy Decision Making on the Internet: Focus on Dual-Calculus Model (온라인 환경에서 프라이버시 의사결정에 영향을 미치는 요인에 관한 연구: 이중계산모델을 중심으로)

  • Kim, Sanghee;Kim, Jongki
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.197-215
    • /
    • 2016
  • Purpose This study aims to investigate the factors that influence decision making in relation to providing personal information on the internet with respect to the integration of the privacy calculus theory and protection motivation theory based on the dual-calculus model proposed by Li(2012). Design/methodology/approach The privacy calculus theory and protection motivation theory have been applied to explain privacy behavior to a certain degree but few studies have been conducted to explain privacy behavior based on the integration of these two theories. Although Li(2012) proposed the dual-calculus model, he only proposed its framework and did not carry out an empirical study. Therefore, this study proposes a research model that integrates these two theories and examines the relationship between the two theories through an empirical study. Findings According to the results of empirical analysis, it was found that all relations have statistically significant explanatory power except the relation between coping appraisal and privacy risk in the risk calculus process. Thus, the results verify that external threat played a decisive role in increasing the risk level of a consumer's privacy. It can be discussed the ways to enhance the privacy behavior of consumer on the internet through these findings.