• Title/Summary/Keyword: nature of information

Search Result 2,441, Processing Time 0.03 seconds

What's Next? Connecting the Past and Future of Business-IT Alignment Research

  • Joshy K. X.;Rahul Thakurta
    • Asia pacific journal of information systems
    • /
    • v.32 no.2
    • /
    • pp.395-434
    • /
    • 2022
  • The importance of Business-IT alignment has been well emphasized, and the topic has been a top management concern for the past four decades. The current business environment demands in response to digitalization have made Business-IT alignment even more challenging. We take on the challenge in this research by presenting a comprehensive review of the domain of Business-IT alignment, based on a conceptual model which we propose, to facilitate future theoretical work. The review brought out multiple representations of the concept of Business-IT alignment and the characterization of its antecedents, nature, and outcomes. Based on the treatment of the domain in the extant literature, we chart out possible areas of future explorations. By doing so, this research lays a foundation for continuing inquiry on Business-IT alignment and facilitating future theoretical work.

Survey on the Authentication and Key Management of 802.11s

  • Lam, Jun Huy;Lee, Sang-Gon;Tan, Whye Kit
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.89-92
    • /
    • 2012
  • Wireless Mesh Network expanded the capability of the conventional wireless networking by allowing the nodes to operate in proactive mode, reactive mode or the combination of both, the hybrid mode in the multi-hopping nature. By doing so, the links between the nodes become much more robust and reliable because of the number of paths to reach a destination node from a source node can be more than 1 and do not need to rely on the access point (AP) alone to relay the messages. As there may be many possible ways to form an end-to-end link between 2 nodes, the routing security becomes another main concern of the 802.11s protocol. Besides its reliance on the 802.11i for the security measures, 802.11s also includes some new features such as the Mesh Temporal Key (MTK) and the Simultaneous Authentication of Equals (SAE). The authentication and key management (AKM) process of 802.11s were observed in this paper.

  • PDF

Statistical Measurement of Monsyllable Entropy for Korean Language (한국어 음절의 Entropy에 관한 연구)

  • 이주근;최흥문
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.11 no.3
    • /
    • pp.15-21
    • /
    • 1974
  • The information amount of monosyllables(characters) in Korean language is measured, in order of the following 3 steps. 1) The basic consonants and vowels are partitioned into two steps, 2) These set symbols, C and V, are sequentially combined to obtain the equation which represent the flow state of monosyllables. 3) From the equation, the state graphs can be constructed to examine the proferties of a stochastic process of monosyllables in Korean language. Furthermore, the entropy of Korean language by statistics is measured and compared with that of the western languages. The proposed methods are more definite, systematic, and simpler than the usual methods in examining the nature of information sources.

  • PDF

The meaning of IGF in the context of global governance model (글로벌 거버넌스 공론장으로서 IGF의 의미)

  • Park, Jihwan
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.58-67
    • /
    • 2013
  • An essential prerequisite for negotiating governance of 'internet,' a world of 'end to end' nature, is to guarantee end-users' participation. Internet Governance Forum (IGF), the outcome of World Summit on the Information Society(WSIS) Tunis Agenda, has played an important role as a representative mulitistakeholder - based governance model, which puts emphasis on wide range participation of stakeholders. Notwithstanding multistakeholderism materialized in IGF has been challenged, IGF itself is a unique place for participation to broad internet governance discourse, as all voices get hearing grounded on openness, inclusion, and transparency, quite distinct from the multilateral negotiation based model such as 'Conference on Cyberspace.' Therefore civil society which represents end-users' interest, as a crucial stakeholder of internet governance, should establish more strategic and coordinated approach to IGF itself as well as reformation discourse of internet governance. In this regard, civil society groups of Korea, began with hosting workshops and Open Forum at the 2013 IGF in Bali, Indonesia. This report also describes the detailed activities of Korean civil society group in 2013 IGF.

  • PDF

The Effects of Service Quality on Customer Satisfaction and e-Loyalty in e-learning Site

  • Han, Dae-Mun;Kim, Yeong-Real;Kim, Jong-Woo;Lee, Jung-Ho
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2007.02a
    • /
    • pp.110-113
    • /
    • 2007
  • The purpose of this study was to investigate the nature of relationships among service quality, customer satisfaction and e-loyalty in e-learning site. In order to achieve the study purpose, survey method was applied As a result. it was revealed that service quality had significant effects on customer satisfaction in e-learning site. The influential factors of service quality on customer satisfaction included convenience of use, personalization, tangibles, responsiveness, and reliability in learning site. In addition, service quality had significant effects on e-loyalty as well.

  • PDF

The Limitations of Risk-based Auditing using Fuzzy Methods

  • Mohammadi, Shaban
    • The Journal of Industrial Distribution & Business
    • /
    • v.6 no.1
    • /
    • pp.37-40
    • /
    • 2015
  • Purpose - Investors, creditors, governments, and others make decisions using reasonable information provided by others. In many cases, the users of this information have goals and objectives conflicting with those of the information's producers, indicating the need for external auditors. Research design, data, and methodology - Competition in auditing has noticeably intensified globally, especially in developed countries. This means that auditors are striving to increase the efficiency of their methods. In recent years, risk-based auditing has become prominent among these efforts. In risk-assessment auditing, the auditor may directly affect the effectiveness and efficiency of the audit. Results - As a central framework, the risk assessment process improves audit quality and effectiveness such that the audit will lead to necessary changes. Previous studies have shown that risk assessment affects the nature, timing, and content of audit procedures. Conclusions - In the planning stage of an audit, audit risk assessment may identify any inappropriate or inefficient distribution of resources or determine whether the results of an audit will be ineffective or incorrect. Thus, assessing audit risk is a critical task.

High-Frequency Analysis of Electromagnetic Backscattering from an Ellipsoid (타원체의 역방향 산란 해석)

  • Shim, Jae-Ruen
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.685-688
    • /
    • 2005
  • In this study, an efficient algorithm for the numerical search of the geodesic path of the creeping wave on a doubly curved surface is developed. The ellipsoid as a doubly curved surface is studied because of its three dimensional nature in that it can be used to simulate the body of an aircraft, or a missile body. Numerical result of the geodesic path on an ellipsoid is given.

  • PDF

A Study on the Adequacy of an Archival Arrangement for Government Publications Collections (정부간행물 정리에 있어서의 보존문서 분류법 적용에 관한 연구)

  • Koo Jayoung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.8
    • /
    • pp.209-232
    • /
    • 1981
  • The study aims at bringing to the attentions of Korean librarians the ways and means with government publications, which had hardly been brought to the scene yet. It deals with the characteristics of archives and the nature of an archival arrangement based on 'the principle of provenance' ; the characteristics of government publications in relation to the adequacy of an archival arrangement; the three major devices in use for organizing government publications; and introduction to two sample classification systems. The study concludes with a notion that a vast reservoir of information sources(government publications) should be tapped and put to the use of researchers without delays inherent in library processing. It advocates an archival arrangement for economy and efficiency.

  • PDF

The Visual Information Processing and the Characteristics of Behaviour of the Architectural design Process Using Visual Protocol Analysis (시각적 프로토콜 분석법을 이용한 건축디자인의 시각정보처리 과정 및 행위 특성 분석)

  • 김용일
    • Korean Institute of Interior Design Journal
    • /
    • no.19
    • /
    • pp.53-58
    • /
    • 1999
  • The goal of this paper is to understand the visual information process and the characteristics of behaviour of the architectural design process using visual protocol analysis through the actual experiment by the architect. The visual protocol analysis is developed on the basis of the theories of the visual information processing model and visual mental image, which can explain visual representation in architectural design process. A protocol study is reported in which the experimental data by architect is analyzed through the protocol analysis method. The whole design process is divided into the stage of 9 tasks which are classified into 18 visual representatiov. The results about visual cognition in cognitive science are reviewed and summarized, and these findings will help understand the architectural design nature.

  • PDF

Vicious Cycle of MAC Protocols of Cognitive Radio Ad Hoc Networks: Problem Statement

  • Htike, Zaw;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.294-296
    • /
    • 2012
  • In cognitive radio ad hoc networks, secondary users need to exchange control information before data transmission. This task is not trivial in cognitive radio networks due to the dynamic nature of environment. This problem is sometime called rendezvous problem of cognitive radio network. The rendezvous problem is normally tackled by using two famous approaches: the use of common control channel (CCC) and using channel hopping (a.k.a sequence-based protocols). However, these two famous solutions form a vicious cycle while solving the rendezvous problem. The main purpose of this paper is to point out how and why this vicious cycle is formed.