• Title/Summary/Keyword: information.

Search Result 265,908, Processing Time 0.119 seconds

Analyzing the correlation of Spam Recall and Thesaurus

  • Kang, Sin-Jae;Kim, Jong-Wan
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.21-25
    • /
    • 2005
  • In this paper, we constructed a two-phase spam-mail filtering system based on the lexical and conceptual information. There are two kinds of information that can distinguish the spam mail from the legitimate mail. The definite information is the mail sender's information, URL, a certain spam list, and the less definite information is the word list and concept codes extracted from the mail body. We first classified the spam mail by using the definite information, and then used the less definite information. We used the lexical information and concept codes contained in the email body for SVM learning in the $2^{nd}$ phase. According to our results the spam precision was increased if more lexical information was used as features, and the spam recall was increased when the concept codes were included in features as well.

  • PDF

A study on the model of the information service in the taylorian researcher's cognitive viewpoint (테일러(R. S. Taylor)계 연구자 관점에서의 정보요구 및 탐색모형에 관한 연구)

  • 이승채
    • Journal of Korean Library and Information Science Society
    • /
    • v.22
    • /
    • pp.245-276
    • /
    • 1995
  • This study analyzed the process of information service and its factors in the cognitive viewpoint. And developed a conceptual model to help in developing future information systems and services. The results of this study were summarized as follows : 1) The paradigm of information user study is changing from the system-centered to the user-centered one. 2) The researchers describe the user's internal cognitive process as the starting point of the information service. 3) The user's personal cognitive process influence the process of the information service over. And the focus is a microscopic one including the factors of the perception and recognition of the stimulus, remembering and searching information, reasoning the rules, recognition of the patterns, formalization of the concepts, etc. 4) The information librarian performs the role as a knowledge/ information system interface, and his knowledge structure reflects the organization of that knowledge/information system. 5) The information librarians can perform their role as information specialists actively and offensively. And the performance of the librarians can be measured on the scales of the su n.0, pplying capability of relevant information and the client satisfaction.

  • PDF

Advanced Information Security Management Evaluation System

  • Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.6
    • /
    • pp.1192-1213
    • /
    • 2011
  • Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues within the existing ISMSs via analysis. Based on these analyses, then we proposes the development of an information security management evaluation system (ISMES). The method can be applied by a self-evaluation of the organization and an evaluation of the organization by the evaluation committee. The contribution of this study enables an organization to refer to and improve its information security levels. The case study can also provide a business organization with an easy method to build ISMS and the reduce cost of information security evaluation.

Information Services in Hybrid Information Environments (하이브리드 정보 환경에서의 정보서비스)

    • Journal of Korean Library and Information Science Society
    • /
    • v.32 no.1
    • /
    • pp.309-328
    • /
    • 2001
  • The purpose of this study is to survey various digital library models that form basic concept of the hybrid information services and to suggest the needs of hybrid information services in digital environments as previous stage towards a building of generic information model appropriate to hybrid information environments. This study deals with the change of information service environments and information services of traditional and digital environments, Also addressed are relationships between digital library and information services. Finally. this study suggest the needs of hybrid information services in digital environments and survey various digital library models that form basic concept of the digital library models.

  • PDF

The Impact of Information System Control and Audit on the Perceived Risk of the Computer Crime in Case of Financial Institutions (정보시스템통제 및 감사가 컴퓨터범죄의 인지된 위험에 미치는 영향: 금융기관을 중심으로)

  • Han, In-Gu;Yun, Jong-Ho
    • Asia pacific journal of information systems
    • /
    • v.5 no.1
    • /
    • pp.112-128
    • /
    • 1995
  • The information system control includes organizational structure, control mechanism, and management tools which contribute to accomplish the goals of information system: asset safeguarding, data integrity, effectiveness, and efficiency. Information system audit is the process to evaluate whether the information system accomplishs the goals. Information system auditor examine the reliability of information system control and suggest recommendations to improve the information system control. Both information system control and information system audit activities contribute to prevent and detect the computer crime for the organization. This paper proposes a causal model of information system control/audit and the perceived risk of computer crime, and tests the model using a survey on 38 financial institutions in Korea. Statistical results show that information system control and audit significantly reduce the computer crime risk perceived by the user group. The general control has a stronger impact than the application control. In addition, it turns out that the greater the deviation between the importance and the actual level of information system control is, the higher the perceived risk of computer crime is.

  • PDF

Cognitive Processing with Information Visualization Types and Contextual Reasoning (정보 시각화 형태와 정황 추론에 의한 인식 처리에 관한 연구)

  • Jung, Won-Jin
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.4
    • /
    • pp.75-96
    • /
    • 2007
  • The effects of information quality and the importance of information have been reported in the Information Systems (IS) literature. However, little has been learned about the impact of information visualization types and contextual information on decision quality. Therefore, this study investigated the interaction effects of these variables on decision quality by conducting a laboratory experiment. Based on two types of information visualization and the availableness of contextual information, this study had a $2{\times}2$ factorial design. The dependent variables used to measure the outcomes of decision quality were decision accuracy and time. The results demonstrated that the effects of contextual information on decision quality were significant. In addition, there was a significant main effect of information visualization on decision accuracy. The findings suggest that decision makers can expect to improve their decision quality by enhancing information visualization types and contextual information. This research may extend a body of research examining the effects of factors that can be tied to human decision-making performance.

  • PDF

A Study on Direction of the Electronic Government: with Focused on Freedom of Information

  • Kim, Taek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.10
    • /
    • pp.113-119
    • /
    • 2015
  • In this paper, we propose an efficient freedom of information and Information access right which improves transparent and speedy administration process. To build open Information, we scrutinize that causes of non access right and change of civil service consciousness, attitude for open information by effectively open system circumstances. The Important thing is basic information that is available to the public through an agency's FOIA Reference Guide, all agencies must notify potential FOIA requesters of the formal rules and requirements for the making and handling of FOIA request, through their FOIA regulations. The characteristics of this paper focused on Information access right, causes of non access right and proposed policy. In this paper, The author emphasize are as follows: first, to examine freedom of information' necessity and problem that scrutinize a theoretic analysis, second, to understand civil servant's attitude for the freedom of information, third, to suggest action plan and agenda for the better of Good Governance and Democracy of information.

Quality of Health Information on the Internet

  • Lotfia Mahmoud Refaat Shenishen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.147-151
    • /
    • 2023
  • The article reviews the quality of information on the Internet in general and health information in particular, where the accumulation and steady increase of information available on the Internet, without concern for its quality or importance, and regardless of the target audience, in addition to the lack of evidence of its credibility such as the availability of the name of the editor and references, and the availability of the name of an academic or research body responsible for that information. Add to this the lack of bibliographic data that can help infer the novelty of the information, and verify the element of trust in it . The problem is exacerbated with regard to the health information available on the Internet, due to its danger resulting from the presence of false health information that may cause danger to human health if relied upon. Through this article, the researcher proposes criteria that can help users search for information to measure the degree of quality, trust, and credibility of information in general and health information available on the Internet in particular.

The Influence of Information Security Behaviors on Information Security Performance in Shipping and Port Organization (해운항만조직의 정보보안이행이 정보보안성과에 미치는 영향)

  • Kang, Da-Yeon;Chang, Myung-Hee
    • Journal of Navigation and Port Research
    • /
    • v.40 no.4
    • /
    • pp.213-222
    • /
    • 2016
  • Recently, as cases of organizations' information disclosure occur continuously, it is urgent to manage security of information and establish measures to enhance security of information by an organization itself. Especially, members of an organization should be prepared with measures for information security, and an organization should do its efforts to raise its members' awareness toward information security. I set a research model to verify what effects an organization's fulfillment of regulations to secure information brings to performance of information security and selected members from maritime and port organizations and financial and insurance institutes as sample. Results of the analysis to identify factors affecting information security performance among members of maritime and port organizations are as follows. Firstly, I found that the factors affecting information security awareness are information security attitude and information security standards. Secondly, the factor giving influence on information security policy of an organization was found to be information security standards. In contrast, information security punishments and information security training were verified not to give influence on compliance of information security policy. Thirdly, information security awareness was identified to give significant influence on compliance of information security policy, information security competence and information security behavior. Fourthly, compliance of information security policy was verified to be those factors that give influence on information security competence and information security behavior. Lastly, information security competence and information security behavior were found to be such factors that give influence on information security performance.

The Health Information for Health Promotion (건강증진을 위한 보건정보)

  • 김종갑;강성홍
    • Korean Journal of Health Education and Promotion
    • /
    • v.10 no.1
    • /
    • pp.21-33
    • /
    • 1993
  • Human health is affected by physical, social, cultural, economic, and political environment. To improve health status, of the people we need much support from social system and to make social supporting system effective for health promotion, we need health information. Because, the health information is basic to the social supporting system for health promotion. So, we should construct health information systems as follows : 1. Health information system for children 2. Health information system for families 3. Health information system for adolescents 4. Health information system for mothers 5. Health information system for workers 6. Health information system for physical handicapped 7. Health information system for elders

  • PDF