• 제목/요약/키워드: transaction records

검색결과 71건 처리시간 0.031초

Product-Sharing and Outcome Generation: New Contributions of Libraries to Research, Learning and Professional Development in Japanese Context

  • Oda, Mitsuhiro
    • 한국문헌정보학회지
    • /
    • 제45권2호
    • /
    • pp.61-74
    • /
    • 2011
  • The author analyses the challenging activities of Japanese libraries in this decade by launching two keywords; "product-sharing" and "outcome generation." "Product-sharing" means that libraries share knowledge, skills, and records which are produced as the result of the services or in the process of activities. And "outcome generation" means that libraries generate any efficiency or effectiveness through their services to users. Using these concepts, reported are the current situation and aspects of Japanese libraries which try to make various contributions to the society; research and learning of the people, and education and training for professional librarians, and so on. In the analysis, the author shows some examples of "product-sharing" at first, including the records of reference transaction and the multi-functioned online public access catalogue. Especially, focused is on the various possibility and adoptability of the Collaborative Reference Database System of the National Diet Library of Japan. This system is one of digital reference service in Japan, and the database of reference transaction records is expected to be useful for research and academic studyies as knowledge-base of professional librarians. And the system is also expected to be a platform for LIS education and professional development in the e-learning environment. Secondly, as the examples of "outcome generation", explained are the problem-solving-type activities, and provision of the collection about books on struggling against disease and illness. A few examples of outcome in the problem-solving-type activities are these; increase of sales in the services for shop managers, business persons, and entrepreneurs, contribution to affluent daily life by providing the local information services to residents and neighbourhoods, and etc. And for both the patients with serious cases and their family or those who nurse them, books about other persons' notes or memorandum are the greatest support, and sometime healing. The author discuss the 'raison d'etre' of these activities focusing on public libraries in Japan.

학교 기록물 분류의 문제점과 개선방안 학교 기록관리기준표 분석을 중심으로 (Causes and Countermeasures of School Records Misclassifications : Focusing on the 'General Disposition Authority for School Records')

  • 우지원;설문원
    • 기록학연구
    • /
    • 제58호
    • /
    • pp.299-332
    • /
    • 2018
  • 이 연구는 학교 기록물 분류의 현황을 분석하여 오분류 실태와 그 원인을 밝히고, 이를 토대로 기록관리기준표의 개선방안을 도출하기 위한 것이다. 이를 위해 우선 표본으로 설정된 초, 중, 고 4개 학교가 1년 동안 생산 접수한 기록물을 전수 분석하여 오분류로 의심되는 사례들을 파악하였다. 오분류의 원인 분석과 대안 제시를 위해 행정실장 2명, 공 사립 주무관 2명, 기록연구사 7명 등 총 11명의 자문단을 구성하여 2차에 걸친 집단 면담을 실시하였다. 학교 기록관리기준표에 제시된 공통업무를 중심으로 오분류가 빈번히 이루어지는 33개의 단위과제를 선별하였고, 이들 단위 과제를 중심으로 오분류의 원인을 분석하였다. 오분류의 핵심 원인을 2가지로 유형화하였으며 이러한 원인별로 해설 보강과 복잡한 업무에 대한 업무흐름도 추가라는 기록관리기준표 개선방안을 제시하였다.

서울시 대중교통 이용자의 통행패턴 분석 (Travel Patterns of Transit Users in the Metropolitan Seoul)

  • 이금숙;박종수
    • 한국경제지리학회지
    • /
    • 제9권3호
    • /
    • pp.379-395
    • /
    • 2006
  • 본 연구의 목적은 도시성장과 함께 통행거리와 교통량이 크게 늘어나 심각한 교통체증현상을 보이고 있는 서울을 대상으로 교통흐름의 공간적 특징을 파악하고, 이를 수도권 지역의 토지이용 및 시설 분포와 연결시켜 수도권 지역의 기능적 연계의 공간구조를 밝히는 것이다. 이를 위해 본 연구에서는 교통카드를 이용하여 이동하는 대중교통 이용자들이 만들어 내는 통행 거래 자료를 바탕으로 통행행태와 통행흐름의 공간적 특징을 분석하였다. 교통카드 데이터는 하루 천만 건이 넘으며, 각 통행거래자료 마다 승 하차 및 환승의 위치와 시간, 이용 교통수단 등 방대한 정보를 담고 있어 이의 효율적 분석을 위하여 데이터마이닝 기법을 도입하였다. 특히 대중교통이용자의 통행행태를 파악하고 각 지점의 통행 수요를 파악하기 위한 새로운 알고리즘 개발하여 적용하였다. 분석결과의 공간적 특성을 파악하기위하여 지리정보체계를 이용하여 시각화시키고, 그에 입각하여 공간적 특성을 분석하였다. 또한 출발 교통량, 도착교통량, 총 지지도들 간의 관계성을 파악하기 위하여 상관관계분석을 시도하였다. 통행수요에 있어 강남의 2호선 지하철역을 따라 가장 많은 통행 수요가 나타나고 있으며, 그 다음으로 강북의 구도심지역이 또 하나의 중심축을 이룬다. 그밖에도 대단위 고층 아파트가 밀집되어 있는 주거지역들이 부수적인 중심축을 형성한다. 기 종점 수요와 함께 통과 수송량 까지 나타내는 총지지도는 강남의 구로-신도림 역이 가장 놓게 나타나며 강남지역에 위치한 지하철 2호선 역들과 환승역들에서 높게 나타나고 있다. 이러한 통행패턴 분석은 일차적으로는 교통망 상의 교통흐름과 각 지점의 통행수요를 나타나며 지역 내에서 지점 간의 기능적 연계를 반영하고 있기 때문에 도시의 교통계획은 물론 지역의 토지이용 및 시설 입지 계획 수립에 필수적이다.

  • PDF

에이전트기반 개방병원 간호기록시스템 설계에 관한 연구 (A Study on Design of Agent based Nursing Records System in Attending System)

  • 김경환
    • 지능정보연구
    • /
    • 제16권2호
    • /
    • pp.73-94
    • /
    • 2010
  • 개방병원에 환자의 입원을 의뢰한 담당 의사들은 환자들의 상태와 제대로 된 간호서비스를 받고 있는지에 대한 정보를 간호기록을 열람함으로써 확인할 수 있다. 하지만 간호기록은 병원의 내부자료로써 외부기관에 쉽게 공개할 수 없는 자료이고 표준화가 확립되어 있지 않아 병원별로 다르게 작성되고 있어 필요한 정보를 공유하는데 많은 어려움이 따른다. 따라서 본 연구에서는 개방병원 간호기록의 작성과 공유를 지원하기 위한 시스템을 개발하고자 하였다. 본 시스템은 우선 간호기록을 실제로 작성하는 간호사의 편의성을 고려하여 간호기록항목사전을 설정하게 하고 간호사와 의사간의 지능형 에이전트를 이용한 협상으로 작성과 공개의 항목을 확정하도록 하였다. 이 모든 과정은 의료기관간의 네트워킹을 지원할 수 있도록 웹기반시스템으로 설계되었고 실제 구현을 통하여 실현가능성을 확인하였다.

The Importance of a Borrower's Track Record on Repayment Performance: Evidence in P2P Lending Market

  • KIM, Dongwoo
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제7권7호
    • /
    • pp.85-93
    • /
    • 2020
  • In peer-to-peer (P2P) loan markets, as most lenders are unskilled and inexperienced ordinary individuals, it is important to know the characteristics of borrowers that significantly impact their repayment performance. This study investigates the effects and importance of borrowers' past repayment performance track record within the platform to identify its predictive power. To this end, I analyze the detailed loan repayment data from two leading P2P lending platforms in Korea using a Cox proportional hazard, multiple linear regression, and logit models. Furthermore, the predictive power of the factors proxied by borrowers' track records are evaluated through the receiver operating characteristic (ROC) curves. As a result, it is found that the borrowers' past track record within the platform have the most important impact on the repayment performance of their current loans. In addition, this study also reveals that the borrowers' track record is much more predictive of their repayment performance than any other factor. The findings of this study emphasize that individual lenders must take into account the quality of borrowers' past transaction history when making a funding decision, and that platform operators should actively share the borrowers' past records within the markets with lenders.

국제무역거래(國際貿易去來)에서의 신용상거래(信用狀去來) 사기사건(詐欺事件)의 대처방안(對處方案) (How to deal with Fraud Cases in L/C-based Transactions in International trade business)

  • 남선모
    • 한국중재학회지:중재연구
    • /
    • 제18권2호
    • /
    • pp.173-199
    • /
    • 2008
  • A letter of credit transaction of the preexistence have been raising one's head fraud charge problem as a result of abusing the principles of independence and abstraction. Every society has certain rules and conventions which it regards as important and most of people in any society. The paper document means a document in a traditional paper form. The eUCP credit must specify the formats in which electronic records are to be presented. In these present times, the issuance of documentary credit are performed by the SWIFT(Society for Worldwide Inter bank Financial Telecommunication) system. The eUCP have been written to allow for presentation completely electronically or for a mixture of paper documents and electronic presentation. Presentation is deemed not to have been made if the Beneficiary's notice is not received. An electronic record that cannot be authenticated is deemed not to have been presented. The e-UCP is the supplement of current existing UCP but is superior to UCP under some circumstances. The document shall include an electronic record. The place for presentation of electronic records means an electronic address. The current e-UCP is not clear on this matter. We have to note followings in case of presenting the documents electronically and applying the e-UCP. There are three principles in the letter of credit transaction, that is to say, independence and abstraction, document dealing, strict compliance. IN the electronic letter of credit, these principles are called as independence and abstraction, electronic document dealing, strict compliance.

  • PDF

Microsoft SQL Server 삭제 이벤트의 데이터 잔존 비교 (Comparison of Remaining Data According to Deletion Events on Microsoft SQL Server)

  • 신지호
    • 정보보호학회논문지
    • /
    • 제27권2호
    • /
    • pp.223-232
    • /
    • 2017
  • Microsoft SQL Server의 데이터 복구와 관련된 그간의 연구는 삭제된 레코드가 트랜잭션 로그에 존재하는 경우를 바탕으로 복원하는 방법이 주를 이루었다. 그러나 관련 트랜잭션 로그가 존재하지 않거나 물리 데이터베이스 파일이 Server와 연결되어 있지 않은 경우 적용하기 곤란한 한계가 있었다. 그러므로 범죄 과정에서 용의자가 delete 외 다른 이벤트를 이용하여 삭제할 가능성이 있기 때문에 이에 대한 삭제된 레코드의 잔존을 확인하여 복구 가능성을 확인해볼 필요가 있다. 이 논문에서는 Microsoft SQL Server 물리 데이터베이스 파일의 구조를 기초로 데이터 삭제가 수행되는 delete, truncate, drop 이벤트에 따른 Page 할당정보 유지 여부, 미할당 삭제데이터 존재 여부, 페이지 내 행오프셋 배열 정보의 변화를 실험하여 최종적으로 디지털포렌식 조사 시 관리도구 이용 가능성 및 데이터 복구 가능성을 확인하였다.

A Trusted Sharing Model for Patient Records based on Permissioned Blockchain

  • Kim, Kyoung-jin;Hong, Seng-phil
    • 인터넷정보학회논문지
    • /
    • 제18권6호
    • /
    • pp.75-84
    • /
    • 2017
  • As there has been growing interests in PHR-based personalized health management project, various institutions recently explore safe methods of recording personal medical and health information. In particular, innovative medical solution can be realized when medical researchers and medical service institutes can generally get access to patient data. As EMR data is extremely sensitive, there has been no progress in clinical information exchange. Moreover, patients cannot get access to their own health data and exchange it with researchers or service institutions. It can be operated in terms of technology, yet policy environment are affected by state laws as well as Privacy and Security Policy. Blockchain technology-independent, in transaction, and under test-is introduced in the medical industry in order to settle these problems. In other words, medical organizations can grant preliminary approval on patient information exchange by using the safely encrypted and distributed Blockchain ledger and can be managed independently and completely by individuals. More apparently, medical researchers can gain access to information, thereby contributing to the scientific advance in rare diseases or minor groups in the world. In this paper, we focused on how to manage personal medical information and its protective use and proposes medical treatment exchange system for patients based on a permissioned Blockchain network for the safe PHR operation. Trusted Model for Sharing Medical Data (TMSMD), that is proposed model, is based on exchanging information as patients rely on hospitals as well as among hospitals. And introduce medical treatment exchange system for patients based on a permissioned Blockchain network. This system is a model that encrypts and records patients' medical information by using this permissioned Blockchain and further enhances the security due to its restricted counterfeit. This provides service to share medical information uploaded on the permissioned Blockchain to approved users through role-based access control. In addition, this paper presents methods with smart contracts if medical institutions request patient information complying with domestic laws by using the distributed Blockchain ledger and eventually granting preliminary approval for sharing information. This service will provide an independent information transaction and the Blockchain technology under test will be adopted in the medical industry.

비트코인에 대한 안정성 확보를 위한 문제점 분석 (Problem Analysis to Secure Stability of Bitcoin)

  • 최희식;조양현
    • 디지털산업정보학회논문지
    • /
    • 제13권3호
    • /
    • pp.1-9
    • /
    • 2017
  • Recently, Bitcoin which is digital currency and cryptocurrency is getting worldwide attention since Bitcoin has an ability to replace legal tender unlike other existing cyber currency. Especially, most Bitcoin trading is done between two traders such as P2P method and it does not require a third-party to make sure reliability and it records every transaction details, so it is more transparent then traditional financial trade, so the number of users is increasing. However, Bitcoin, which has been recognized for transparency, confidentiality and stability among traders has recently been threatened by illegal transactions such as money laundering and the attack on the exchange. These threats to Bitcoin are becoming social problems. At first, it seems that most of the digital currency is difficult to get hacked due to the Blockchain technology. However, threats such as digital money leaks by user account hacking and paralyzing the servers are increasing. In this paper, it will examine the features of the Bitcoin and the threatening elements to secure marketability of digital currency such as Bitcoin and receive more interest from public in domestic. The paper will examine the problems of Blockchain technology on speculative transactions and fraudulent behavior by analyzing the problems of Bitcoin transaction. Lastly, it will propose ways to make transparent and secure digital currency transactions.

A new security model in p2p network based on Rough set and Bayesian learner

  • Wang, Hai-Sheng;Gui, Xiao-Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권9호
    • /
    • pp.2370-2387
    • /
    • 2012
  • A new security management model based on Rough set and Bayesian learner is proposed in the paper. The model focuses on finding out malicious nodes and getting them under control. The degree of dissatisfaction (DoD) is defined as the probability that a node belongs to the malicious node set. Based on transaction history records local DoD (LDoD) is calculated. And recommended DoD (RDoD) is calculated based on feedbacks on recommendations (FBRs). According to the DoD, nodes are classified and controlled. In order to improve computation accuracy and efficiency of the probability, we employ Rough set combined with Bayesian learner. For the reason that in some cases, the corresponding probability result can be determined according to only one or two attribute values, the Rough set module is used; And in other cases, the probability is computed by Bayesian learner. Compared with the existing trust model, the simulation results demonstrate that the model can obtain higher examination rate of malicious nodes and achieve the higher transaction success rate.