• Title/Summary/Keyword: user contribution

Search Result 234, Processing Time 0.024 seconds

A Study on the User-contributed Reviews for the Next Generation Library Catalogs (차세대 도서관 목록의 이용자 서평에 관한 고찰)

  • Yoon, Cheong-Ok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.46 no.2
    • /
    • pp.115-132
    • /
    • 2012
  • The purpose of this study is to examine the current status of user-contributed reviews for the Next Generation Library Catalogs, and the potential impact of user reviews available from the external sources, including Amazon.com and GoodReads.com. During the period of February 16th through April 4th, 2012, the number of holding libraries and user-contributed reviews, tags and reading lists of ten selected books were examined from the WorldCat. Also the user-contributed reviews for the same books available from Amazon.com and GoodReads.com were examined, and a case of reviews for one book was analyzed. The result shows that only a few users participated in the WorldCat, and user-contributed reviews were rarely used, when compared with tags or reading lists. Several hundred to thousand user-contributed reviews for the same books were available from Amazon.com and GoodReads.com directly linked with bibliographic records. A case of one book from Amazon.com reveals the possibility of distorting the function of user-contribution. With the introduction of the function of user-contribution, it is expected that its growth rate should be carefully observed and its potential impact on users should be thoroughly and systematically analyzed in the near future.

Implementation of a Network Provisioning System with User-driven and Trusty Protection Management

  • Lim, H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4720-4738
    • /
    • 2015
  • Proper management on user-driven virtual circuits (VCs) is essential for seamless operation of virtual networks. The Network Provisioning System (NPS) is useful software for creating user-driven VCs automatically and must take fault management into account for physical layer impairments on user-driven VCs. This paper addresses a user-driven and trusty protection management in an NPS with an open standard Network Service Interface (NSI), as a contribution to show how to implement the user-driven and trusty protection management required for user-driven VCs. In particular, it provides a RESTful web service Interface for Configuration and Event management (RICE) that enable management of a distinguished data and control plane VC status between Network Service Agents (NSAs) in the event of a node or link fault and repair in a domain. This capability represents a contribution to show how network and protection events in a domain can be monitored between NSAs (NPSs with the NSI) in multiple domains. The implemented NPS controls and manages both the primary and backup VC with disjoint path in a user-driven manner. A demonstration to verify RICE API's capability is addressed for the trusty protection in the dynamic VC network.

An Empirical Study on Development of IS Evaluation Indices : In Case of Public Sectors (정보시스템 평가지표 개발에 관한 실증적 연구 : 공공부문을 중심으로)

  • 정해용;김상훈
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.4
    • /
    • pp.155-189
    • /
    • 2003
  • In this research, the comprehensive evaluation model of IS(information systems) for public sectors is theoretically constructed through reviewing and integrating previous IS evaluation-related research. This model is hypothesized to consist of five sectors(System Sector, User Sector, Organization and Management Sector, Resource Management Sector and Strategic Contribution Sector), ten evaluation items belonging to these five evaluation sectors, and sixty two evaluation indices for these ten evaluation items. The results of empirical analyses to test the validity of the research model show that the evaluation sectors turn out to be the same ones as proposed in the hypothetical model. The evaluation items(System Quality, Information Quality, Service Quality) in System Sector proves to be consistent with the hypothetical model. However, in case of User Sector, two evaluation items(Perceived Usefulness and User Satisfaction) which are included in the hypothetical model are found to be merged into one item(User Satisfaction). And, it is shown that four evaluation items such as the Efficiency of Internal Process, Customer Satisfaction, Organizational Innovation, and the Degree of Informatization competence improvement are included in Organization and Management Sector, differently from the research model in which the items, Organizational innovation and the Degree of Informatization competence improvement, are not divided. As a final result, sixty two evaluation indices that comprise all the evaluation items belonging to five sectors are found to be reduced to fifty seven ones through factor analyses, criterion-related validity tests and reliability analyses.

Efficiency and Fairness in Information System Chargeback (정보시스템 Chargeback에 있어서의 효율성과 공평성의 관계)

  • Yu, Yeong-Jin;An, Jung-Ho
    • Asia pacific journal of information systems
    • /
    • v.1 no.1
    • /
    • pp.117-145
    • /
    • 1991
  • IS changeback is regarded as an offective way to control the usage of computers and communication systems which are very much limited resources and whose costs are very high, In this paper, the problem of combining the optimal chargeback system which guarantees the efficiency with the Rawls'(1971) concept of fairness. Primary conclusion of this paper is that if the value function which represents the contributions of IS user to the firm's profit is evidit and there is no uncertainty about this contribution information, optimality can be achived without any loss of fairness using full cost allocation pricing. But if there is no significant differences among contribution of each user and there is no significant differences among users because of the managerial arbitrariness, From this point of view contingent chargeback system with which manager can find the golden middle between optimality and fairness by adjusting the 'efficiency coefficient' according to his/her organizational characterisics and environments is proposed. A heuristic of finding the appropriate efficiency coefficient is also suggested.

  • PDF

A Smart Lighting Management System with Satisfaction of User's Lighting Requirements (사용자 요구조도 만족 스마트 조명 관리시스템)

  • Shin, Dae-Sik;Kim, Hoon
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.27 no.6
    • /
    • pp.1-8
    • /
    • 2013
  • In this paper, we proposed a smart lighting management system controls the lighting efficiently to reduce energy consumption while satisfying user's lighting requirements. The proposed system considers the available daylight intensity and indoor light source to satisfy the lighting requirements of each user according to the work environment. In addition, for user convenience, we have developed different user interfaces for lighting control including local interface, and remote interface through internet or Bluetooth for personal computer as well as smart phones. The proposed system satisfies the lighting requirements of each user according to the corresponding work environment. The proposed smart lighting management system utilizes the lighting energy efficiently, and can be considered a significant contribution towards future green buildings.

Copyright Issues to User-Contributed Content in Participatory Digital Archives (참여형 디지털 아카이브에서의 이용자기여콘텐츠에 관한 저작권 고찰)

  • Kim, Su-jin;Sinn, Donghee
    • The Korean Journal of Archival Studies
    • /
    • no.49
    • /
    • pp.5-49
    • /
    • 2016
  • This study investigates how participatory digital archives should handle user-contributed content in order to legitimately collect from and make available to users according to current copyright laws and related regulations. In doing so, this study surveys the current national and international copyright laws that would apply for digital contents in archives. It also reviews the existing literature that analyzes the understanding and interpretation of regulations and specific infringement cases. Then, it examines the cases of participatory digital archives as to how they deal with the copyright issues to user-contributed content and provide guidance to users in this respect. Based on such analysis, the study suggests a few methods of how digital archives acquire necessary rights for the user-contributed content being housed in archives and how they provide useful guidance to users about their rights and responsibilities. These methods include terms and conditions for contribution/service and essential elements in terms, contributor agreements and their details, and other user guidelines.

Security Analysis of a Biometric-Based User Authentication Scheme (Biometric 정보를 기반으로 하는 사용자 인증 스킴의 안전성 분석)

  • Lee, Young Sook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.81-87
    • /
    • 2014
  • Password-based authentication using smart card provides two factor authentications, namely a successful login requires the client to have a valid smart card and a correct password. While it provides stronger security guarantees than only password authentication, it could also fail if both authentication factors are compromised ((1) the user's smart card was stolen and (2) the user's password was exposed). In this case, there is no way to prevent the adversary from impersonating the user. Now, the new technology of biometrics is becoming a popular method for designing a more secure authentication scheme. In terms of physiological and behavior human characteristics, biometric information is used as a form of authentication factor. Biometric information, such as fingerprints, faces, voice, irises, hand geometry, and palmprints can be used to verify their identities. In this article, we review the biometric-based authentication scheme by Cheng et al. and provide a security analysis on the scheme. Our analysis shows that Cheng et al.'s scheme does not guarantee any kind of authentication, either server-to-user authentication or user-to-server authentication. The contribution of the current work is to demonstrate these by mounting two attacks, a server impersonation attack and a user impersonation attack, on Cheng et al.'s scheme. In addition, we propose the enhanced authentication scheme that eliminates the security vulnerabilities of Cheng et al.'s scheme.

Analysis of Models and Contributions of Demand Responsive Transit(DRT) for Public Transportation Service Weak Areas (지방자치단체의 대중교통 소외지역 수요응답형 교통수단(DRT) 제도 도입에 따른 모형 및 기여도 분석)

  • Ji, Minkyung;Kim, Eungcheol
    • Journal of Urban Science
    • /
    • v.7 no.2
    • /
    • pp.1-9
    • /
    • 2018
  • In this study, Analysis of DRT model and contribustion based on the case of local governments adopting the Demand Responsive Transit(DRT) in order to provide transportation in public transportation service weak area. Based on the case of Yeoju Area, the contribution of the DRT was analyzed. The DRT model was established as a fixed and call type model with taxi and bus transportation. Based on the results of the happy taxi service in Yeoju Area in 2016, the contribution of DRT was analyzed. According to the happy taxi performance of Yeoju city, it was introduced to 27 villages, and operated 4,188 times. And 9,111 people used it and Yeoju Area supported about 53 million Won. The contribution of local governments was analyzed in terms of local government, users, and social aspects. On local government aspects, we analyzed the budget cuts and complaints resolution. On the user aspects, we analyzed waiting time reduction, walking time reduction, travel time reduction, comfort, punctuality, and stability. On social aspects, we analyzed taxi and regional economy activation, and convenience of mobility.

A Study on User's Voluntary Behavior in Company Social Networks(CSN) (기업의 관계적 성과로서 기업소셜네트워크 이용자의 자발행동에 관한 연구)

  • Kang, Inwon;Cho, Eunsun
    • Journal of Information Technology Services
    • /
    • v.13 no.2
    • /
    • pp.35-53
    • /
    • 2014
  • Company Social Networks (CSN) has emerged as a commonly used marketing channel. One of the most important advantages in CSN is the user's voluntary behavior as a relational performance. We classified level of voluntary behavior, as 'consumption', 'active participation', and 'creative contribution' to comprehend different relational performance of CSN. Moreover, we proposed research model to compare positive attitude and negative attitude. This study aims to investigate 'the process of user's voluntary behavior in CSN' which is causal relationship between benefits of CSN, user's attitude and voluntary behavior. Empirical results with 175 valid questionnaire data revealed that CSN benefit factors played a significant role in trust and distrust. Based on these effects, trust and distrust have different influences as level of voluntary behavior, just as proposed. For practitioners, it is crucial finding that users are more active behavior based on strong trust.

Performance Evaluation of the WiMAX Network under a Complete Partitioned User Group with a Traffic Shaping Algorithm

  • Akhter, Jesmin;Islam, Md. Imdadul;Amin, M.R.
    • Journal of Information Processing Systems
    • /
    • v.10 no.4
    • /
    • pp.568-580
    • /
    • 2014
  • To enhance the utilization of the traffic channels of a network (instead of allocating radio channel to an individual user), a channel or a group of channels are allocated to a user group. The idea behind this is the statistical distribution of traffic arrival rates and the service time for an individual user or a group of users. In this paper, we derive the blocking probability and throughput of a subscriber station of Worldwide Interoperability for Microwave Access (WiMAX) by considering both the connection level and packet-level traffic under a complete partition scheme. The main contribution of the paper is to incorporate the traffic shaping scheme onto the incoming turbulent traffic. Hence, we have also analyzed the impact of the drain rate of the buffer on the blocking probability and throughput.