• 제목/요약/키워드: user contribution

검색결과 235건 처리시간 0.027초

차세대 도서관 목록의 이용자 서평에 관한 고찰 (A Study on the User-contributed Reviews for the Next Generation Library Catalogs)

  • 윤정옥
    • 한국문헌정보학회지
    • /
    • 제46권2호
    • /
    • pp.115-132
    • /
    • 2012
  • 이 연구의 목적은 차세대 도서관 목록에서 이용자 서평 기능의 이용 현황 및 서지레코드에서 연결될 수 있는 외부 정보원의 이용자 서평의 영향 가능성을 살펴보는 것이다. 2012년 2월 16일부터 4월 4일 사이에 2010년에 출간된 열권의 책을 대상으로 WorldCat에서 소장도서관, 이용자 서평, 태그 및 독서 리스트의 현황 및 변동 추이, 그리고 서지레코드에 연결된 Amazon.com과 GoodReads.com의 이용자 서평 현황을 살펴보았다. WorldCat에서 아직 이용자 참여 기능의 활용도는 매우 낮았으며, 이용자 서평보다는 태그나 독서 리스트를 통한 참여가 더 많았다. 같은 책들에 대한 아마존과 굿리즈의 이용자 서평 참여도는 매우 높았고, 아마존에서 한 권의 책과 관련된 이용자 서평 사례 분석은 이용자 참여 기능이 왜곡될 수 있는 가능성을 암시하였다. 아직은 초기 단계인 도서관 목록에 대한 이용자 참여 기능의 확산 및 안정화 추이의 지속적 관찰, 그리고 이 기능이 이용자의 자료 선택에 미치는 영향의 심층적, 체계적 분석이 필요하다.

Implementation of a Network Provisioning System with User-driven and Trusty Protection Management

  • Lim, H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4720-4738
    • /
    • 2015
  • Proper management on user-driven virtual circuits (VCs) is essential for seamless operation of virtual networks. The Network Provisioning System (NPS) is useful software for creating user-driven VCs automatically and must take fault management into account for physical layer impairments on user-driven VCs. This paper addresses a user-driven and trusty protection management in an NPS with an open standard Network Service Interface (NSI), as a contribution to show how to implement the user-driven and trusty protection management required for user-driven VCs. In particular, it provides a RESTful web service Interface for Configuration and Event management (RICE) that enable management of a distinguished data and control plane VC status between Network Service Agents (NSAs) in the event of a node or link fault and repair in a domain. This capability represents a contribution to show how network and protection events in a domain can be monitored between NSAs (NPSs with the NSI) in multiple domains. The implemented NPS controls and manages both the primary and backup VC with disjoint path in a user-driven manner. A demonstration to verify RICE API's capability is addressed for the trusty protection in the dynamic VC network.

정보시스템 평가지표 개발에 관한 실증적 연구 : 공공부문을 중심으로 (An Empirical Study on Development of IS Evaluation Indices : In Case of Public Sectors)

  • 정해용;김상훈
    • 한국경영과학회지
    • /
    • 제28권4호
    • /
    • pp.155-189
    • /
    • 2003
  • In this research, the comprehensive evaluation model of IS(information systems) for public sectors is theoretically constructed through reviewing and integrating previous IS evaluation-related research. This model is hypothesized to consist of five sectors(System Sector, User Sector, Organization and Management Sector, Resource Management Sector and Strategic Contribution Sector), ten evaluation items belonging to these five evaluation sectors, and sixty two evaluation indices for these ten evaluation items. The results of empirical analyses to test the validity of the research model show that the evaluation sectors turn out to be the same ones as proposed in the hypothetical model. The evaluation items(System Quality, Information Quality, Service Quality) in System Sector proves to be consistent with the hypothetical model. However, in case of User Sector, two evaluation items(Perceived Usefulness and User Satisfaction) which are included in the hypothetical model are found to be merged into one item(User Satisfaction). And, it is shown that four evaluation items such as the Efficiency of Internal Process, Customer Satisfaction, Organizational Innovation, and the Degree of Informatization competence improvement are included in Organization and Management Sector, differently from the research model in which the items, Organizational innovation and the Degree of Informatization competence improvement, are not divided. As a final result, sixty two evaluation indices that comprise all the evaluation items belonging to five sectors are found to be reduced to fifty seven ones through factor analyses, criterion-related validity tests and reliability analyses.

정보시스템 Chargeback에 있어서의 효율성과 공평성의 관계 (Efficiency and Fairness in Information System Chargeback)

  • 유영진;안중호
    • Asia pacific journal of information systems
    • /
    • 제1권1호
    • /
    • pp.117-145
    • /
    • 1991
  • IS changeback is regarded as an offective way to control the usage of computers and communication systems which are very much limited resources and whose costs are very high, In this paper, the problem of combining the optimal chargeback system which guarantees the efficiency with the Rawls'(1971) concept of fairness. Primary conclusion of this paper is that if the value function which represents the contributions of IS user to the firm's profit is evidit and there is no uncertainty about this contribution information, optimality can be achived without any loss of fairness using full cost allocation pricing. But if there is no significant differences among contribution of each user and there is no significant differences among users because of the managerial arbitrariness, From this point of view contingent chargeback system with which manager can find the golden middle between optimality and fairness by adjusting the 'efficiency coefficient' according to his/her organizational characterisics and environments is proposed. A heuristic of finding the appropriate efficiency coefficient is also suggested.

  • PDF

사용자 요구조도 만족 스마트 조명 관리시스템 (A Smart Lighting Management System with Satisfaction of User's Lighting Requirements)

  • 신대식;김훈
    • 조명전기설비학회논문지
    • /
    • 제27권6호
    • /
    • pp.1-8
    • /
    • 2013
  • In this paper, we proposed a smart lighting management system controls the lighting efficiently to reduce energy consumption while satisfying user's lighting requirements. The proposed system considers the available daylight intensity and indoor light source to satisfy the lighting requirements of each user according to the work environment. In addition, for user convenience, we have developed different user interfaces for lighting control including local interface, and remote interface through internet or Bluetooth for personal computer as well as smart phones. The proposed system satisfies the lighting requirements of each user according to the corresponding work environment. The proposed smart lighting management system utilizes the lighting energy efficiently, and can be considered a significant contribution towards future green buildings.

참여형 디지털 아카이브에서의 이용자기여콘텐츠에 관한 저작권 고찰 (Copyright Issues to User-Contributed Content in Participatory Digital Archives)

  • 김수진;신동희
    • 기록학연구
    • /
    • 제49호
    • /
    • pp.5-49
    • /
    • 2016
  • 본 연구는 이용자가 자신의 콘텐츠를 제공하는 형식의 참여형 디지털 아카이브에서 저작권에 관련하여 어떻게 이용자들을 안내하고, 적법하게 기록물을 수집, 이용하게 해야 하는지를 탐구한다. 이를 위해 본 연구는 디지털 아카이브에서 고려해야하는 저작권 및 여러 법규의 내용과 적용 범위 등을 살펴보고 선행연구에서 논의한 법규의 해석, 침해 방식 등을 분석하였다. 이를 바탕으로, 기존의 디지털 아카이브에서 어떠한 방식으로 법률적인 규정을 다루고 있는지 구체적인 사례들을 조사하였다. 이렇게 연구된 내용을 통해, 참여형 디지털 아카이브에서 기록물의 원활한 수집과 이용을 위해 할 수 있는 여러 가지 저작권 관련 활동을 모색하였다. 이용자들이 제공하는 콘텐츠를 받아서 활용하는 디지털 아카이브는 분명한 기증과 이용약관을 만들어 공지해야하고, 콘텐츠 기여자들이 확실히 인지할 수 있도록 간략하고 명확한 이용허락동의서를 제시해야하며, 저작권에 위배되지 않는 각 콘텐츠의 이용 범위, 인용방식에 대한 예시 등을 제공해야 한다. 본 연구에서는 디지털 아카이브 측의 입장을 표명하고 저작권을 소개, 적용하는 방법에 관하여 안내하는 방법을 제안한다.

Biometric 정보를 기반으로 하는 사용자 인증 스킴의 안전성 분석 (Security Analysis of a Biometric-Based User Authentication Scheme)

  • 이영숙
    • 디지털산업정보학회논문지
    • /
    • 제10권1호
    • /
    • pp.81-87
    • /
    • 2014
  • Password-based authentication using smart card provides two factor authentications, namely a successful login requires the client to have a valid smart card and a correct password. While it provides stronger security guarantees than only password authentication, it could also fail if both authentication factors are compromised ((1) the user's smart card was stolen and (2) the user's password was exposed). In this case, there is no way to prevent the adversary from impersonating the user. Now, the new technology of biometrics is becoming a popular method for designing a more secure authentication scheme. In terms of physiological and behavior human characteristics, biometric information is used as a form of authentication factor. Biometric information, such as fingerprints, faces, voice, irises, hand geometry, and palmprints can be used to verify their identities. In this article, we review the biometric-based authentication scheme by Cheng et al. and provide a security analysis on the scheme. Our analysis shows that Cheng et al.'s scheme does not guarantee any kind of authentication, either server-to-user authentication or user-to-server authentication. The contribution of the current work is to demonstrate these by mounting two attacks, a server impersonation attack and a user impersonation attack, on Cheng et al.'s scheme. In addition, we propose the enhanced authentication scheme that eliminates the security vulnerabilities of Cheng et al.'s scheme.

지방자치단체의 대중교통 소외지역 수요응답형 교통수단(DRT) 제도 도입에 따른 모형 및 기여도 분석 (Analysis of Models and Contributions of Demand Responsive Transit(DRT) for Public Transportation Service Weak Areas)

  • 지민경;김응철
    • 도시과학
    • /
    • 제7권2호
    • /
    • pp.1-9
    • /
    • 2018
  • In this study, Analysis of DRT model and contribustion based on the case of local governments adopting the Demand Responsive Transit(DRT) in order to provide transportation in public transportation service weak area. Based on the case of Yeoju Area, the contribution of the DRT was analyzed. The DRT model was established as a fixed and call type model with taxi and bus transportation. Based on the results of the happy taxi service in Yeoju Area in 2016, the contribution of DRT was analyzed. According to the happy taxi performance of Yeoju city, it was introduced to 27 villages, and operated 4,188 times. And 9,111 people used it and Yeoju Area supported about 53 million Won. The contribution of local governments was analyzed in terms of local government, users, and social aspects. On local government aspects, we analyzed the budget cuts and complaints resolution. On the user aspects, we analyzed waiting time reduction, walking time reduction, travel time reduction, comfort, punctuality, and stability. On social aspects, we analyzed taxi and regional economy activation, and convenience of mobility.

기업의 관계적 성과로서 기업소셜네트워크 이용자의 자발행동에 관한 연구 (A Study on User's Voluntary Behavior in Company Social Networks(CSN))

  • 강인원;조은선
    • 한국IT서비스학회지
    • /
    • 제13권2호
    • /
    • pp.35-53
    • /
    • 2014
  • Company Social Networks (CSN) has emerged as a commonly used marketing channel. One of the most important advantages in CSN is the user's voluntary behavior as a relational performance. We classified level of voluntary behavior, as 'consumption', 'active participation', and 'creative contribution' to comprehend different relational performance of CSN. Moreover, we proposed research model to compare positive attitude and negative attitude. This study aims to investigate 'the process of user's voluntary behavior in CSN' which is causal relationship between benefits of CSN, user's attitude and voluntary behavior. Empirical results with 175 valid questionnaire data revealed that CSN benefit factors played a significant role in trust and distrust. Based on these effects, trust and distrust have different influences as level of voluntary behavior, just as proposed. For practitioners, it is crucial finding that users are more active behavior based on strong trust.

Performance Evaluation of the WiMAX Network under a Complete Partitioned User Group with a Traffic Shaping Algorithm

  • Akhter, Jesmin;Islam, Md. Imdadul;Amin, M.R.
    • Journal of Information Processing Systems
    • /
    • 제10권4호
    • /
    • pp.568-580
    • /
    • 2014
  • To enhance the utilization of the traffic channels of a network (instead of allocating radio channel to an individual user), a channel or a group of channels are allocated to a user group. The idea behind this is the statistical distribution of traffic arrival rates and the service time for an individual user or a group of users. In this paper, we derive the blocking probability and throughput of a subscriber station of Worldwide Interoperability for Microwave Access (WiMAX) by considering both the connection level and packet-level traffic under a complete partition scheme. The main contribution of the paper is to incorporate the traffic shaping scheme onto the incoming turbulent traffic. Hence, we have also analyzed the impact of the drain rate of the buffer on the blocking probability and throughput.