• Title/Summary/Keyword: recommendations

Search Result 3,349, Processing Time 0.047 seconds

A Study on Disconfirmity to Security Practices of Smart-phone : Focused on Roles of Efficacy (스마트폰 사용자의 보안수칙 실천 부족에 관한 연구 : 효능감의 역할을 중심으로)

  • Kim, Jea-hyun;Kim, Jong-ki
    • The Journal of Information Systems
    • /
    • v.24 no.3
    • /
    • pp.1-19
    • /
    • 2015
  • Purpose This study discusses the contradictory behavior of smart-phone users who consider security is important, but they do not follow the security recommendations. We found through literature research that this contradictory behavior is resulted from a low level of efficacy. Design/methodology/approach Research hypotheses were set based on Extended Parallel Process Model, Control Theory, and Self Efficacy Mechanism. The data were collected from undergraduate students. Total of 178 data were used for the analysis. Findings Results of the analysis, first, showed that the relationship between threat and security attitude varies with the level of coping efficacy. Second, showed that the relationship between threat and fear does not vary with the level of coping efficacy. Both the groups with high coping efficacy and low coping efficacy had a statistically significant effect on the relationship between threat and fear.

Traffic Safety Recommendation Using Combined Accident and Speeding Data

  • Onuean, Athita;Lee, Daesung;Jung, Hanmin
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.49-54
    • /
    • 2020
  • Speed enforcement is one of the major challenges in traffic safety. The increasing number of accidents and fatalities has led governments to respond by implementing an intelligent control system. For example, the Korean government implemented a speed camera system for maintaining road safety. However, many drivers still engage in speeding behavior in blackspot areas where speed cameras are not provided. Therefore, we propose a methodology to analyze the combined accident and speeding data to offer recommendations to maintain traffic safety. We investigate three factors: "section," "existing speed camera location," and "over speeding data." To interpret the results, we used the QGIS tool for visualizing the spatial distribution of the incidents. Finally, we provide four recommendations based on the three aforementioned factors: "investigate with experts," "no action," "install fixed speed cameras," and "deploy mobile speed cameras."

Strategies for Selecting Initial Item Lists in Collaborative Filtering Recommender Systems

  • Lee, Hong-Joo;Kim, Jong-Woo;Park, Sung-Joo
    • Management Science and Financial Engineering
    • /
    • v.11 no.3
    • /
    • pp.137-153
    • /
    • 2005
  • Collaborative filtering-based recommendation systems make personalized recommendations based on users' ratings on products. Recommender systems must collect sufficient rating information from users to provide relevant recommendations because less user rating information results in poorer performance of recommender systems. To learn about new users, recommendation systems must first present users with an initial item list. In this study, we designed and analyzed seven selection strategies including the popularity, favorite, clustering, genre, and entropy methods. We investigated how these strategies performed using MovieLens, a public dataset. While the favorite and popularity methods tended to produce the highest average score and greatest average number of ratings, respectively, a hybrid of both favorite and popularity methods or a hybrid of demographic, favorite, and popularity methods also performed within acceptable ranges for both rating scores and numbers of ratings.

Subjective Measures of Operator Status in Surface Transportation: h Critical Review and Recommendations for Application (지상 교통에 있어서 운전자 상태의 주관적 척도: 비판적 고찰 및 응용을 위한 제언)

  • Heidi D. Howarth;Sohn, Young-Woo
    • Science of Emotion and Sensibility
    • /
    • v.5 no.4
    • /
    • pp.11-32
    • /
    • 2002
  • This article evaluates the existing subjective measures that have been utilized in surface transportation to assess various aspects of operator status such as fatigue, sleepiness, arousal, mood, etc. Specifically, the representative six subjective instruments - Epworth Sleepiness Scale, Karolinska Sleepiness Scale, Pearson and Byars Fatigue Checklist, Stanford Sleepiness Scale, Stress-Arousal Checklist, and NPRU Mood Scale - are compared and contrasted in terms of reliability, . validity, sensitivity, and appropriateness for application. Recommendations for application of the subjective measures in surface transportation are discussed.

  • PDF

Developing a recommendation system for e-newspaper articles through personalizing digital contents

  • Ha Sung Ho;Yi Jae-Shin
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.430-460
    • /
    • 2004
  • This study presented a personalization system that adopted a methodology which is applicable for digital content recommendation and executed by the Internet service providers. The system made a recommendation to the users on the basis of their preferences, while most techniques for recommending digital content have focused on considering the similarity of content. In addition, it developed a method of evaluation to determine the priority of recommendations and adopted measures when selecting a set of recommendations. To experiment the feasibility and effectiveness of the presented methodology, a prototype system was developed and was applied to an English newspaper on the Internet.

  • PDF

A personalized recommendation methodology using web usage mining and decision tree induction (웹 마이닝과 의사결정나무 기법을 활용한 개인별 상품추천 방법)

  • 조윤호;김재경
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2002.05a
    • /
    • pp.342-351
    • /
    • 2002
  • A personalized product recommendation is an enabling mechanism to overcome information overload occurred when shopping in an Internet marketplace. Collaborative filtering has been known to be one of the most successful recommendation methods, but its application to e-commerce has exposed well-known limitations such as sparsity and scalability, which would lead to poor recommendations. This paper suggests a personalized recommendation methodology by which we are able to get further effectiveness and quality of recommendations when applied to an Internet shopping mall. The suggested methodology is based on a variety of data mining techniques such as web usage mining, decision tree induction, association rule mining and the product taxonomy. For the evaluation of the methodology, we implement a recommender system using intelligent agent and data warehousing technologies.

  • PDF

A Study On Enterprise Password Management Recommendations (대규모 조직에서의 패스워드 관리에 관한 권고 고찰)

  • Park, Jin-Sub
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.421-465
    • /
    • 2010
  • Passwords are used in many ways to protect data, systems, and networks. Passwords are also used to protect files and other stored information. In addition, passwords are often used in less visible ways for authentication. In this article, We provides recommendations for password management, which is the process of defining, implementing, and maintaining password policies throughout an enterprise. Effective password management reduces the risk of compromise of password-based authentication systems. Organizations need to protect the confidentiality, integrity, and availability of passwords so that all authorized users - and no unauthorized users - can use passwords successfully as needed. Integrity and availability should be ensured by typical data security controls, such as using access control lists to prevent attackers from overwriting passwords and having secured backups of password files. Ensuring the confidentiality of passwords is considerably more challenging and involves a number of security controls along with decisions involving the characteristics of the passwords themselves.

  • PDF

The changing of fitness and exercise guidelines for old adults (노인들의 체력 변화와 운동의 제언)

  • Yoon, Byung-Kon
    • Journal of Life Science
    • /
    • v.17 no.6 s.86
    • /
    • pp.867-872
    • /
    • 2007
  • The aging is related to numerous changes in our body system which declines functional ability. The functional ability in advanced age can be evaluated by the 4 components of fitness (cardiorespiratory endurance, muscular strength and endurance, flexibility and body composition). The understanding and knowledge of changing 4 components of fitness and the role of exercise on the process of aging is of paramount importance. Despite exercise and physical activity have been shown to delay the process of aging, the exercise guidelines and recommendations for old adults are not well published. This review is to presents the age-related changes in each component of fitness and to present current guidelines and recommendations for exercise in older adults.

Analysis of Quality Management System Operation Conditions for Korean Furniture Industry Using ISO 9000 Audit Results (ISO 9000 심사결과를 활용한 한국가구산업의 품질경영시스템 운영실태분석)

  • Park, Dong-Joon;Jung, Hyun-Seok;Kim, Ho-Gyun;Kang, Byung-Hwan
    • IE interfaces
    • /
    • v.13 no.4
    • /
    • pp.688-693
    • /
    • 2000
  • We analyze IS0 9001 audit data and add-on requirements data collected by leader assessors from three leading Korean furniture companies for around three years. We plot a Pareto chart and test the homogeneities for the number of non-compliances and improvement notes across companies. We also fit the data to a loglinear model. Some recommendations with regard to add-on requirements are suggested. The recommendations should be added to IS0 9001 requirements to specifically implement an efficient QMS in Korean furniture industry.

  • PDF

Informatization of Telecommunication Services: Its Actual Conditions and Policy Recommendations (통신서비스의 정보화: 그 현황 및 개선 방향)

  • Cho, Chan-Sik
    • Journal of Information Management
    • /
    • v.26 no.4
    • /
    • pp.1-27
    • /
    • 1995
  • Telecommunication services are important means of information exchanges in information society, and information of them connotes the enabling of information exchanges through telecommunication services in all parts of the society. This study, on top of a theoretical foundation of the informatization of telecommunication services, examines and analyzes historical and actual conditions of the services, and tries to make some policy recommendations based on the analysis.

  • PDF