{"title":"Risk Analysis for Protecting Personal Information in IoT Environments","authors":"A. Lee, Beomsoo Kim, Jae-Bin Jang","doi":"10.9716/KITS.2016.15.4.041","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.4.041","url":null,"abstract":"","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"2004 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125807009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Application of Reinforcement Learning Algorithm Using Pixel Data","authors":"S. Moon, Yongchan Choi","doi":"10.9716/KITS.2016.15.4.085","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.4.085","url":null,"abstract":"Submitted:October 17, 2016 1 st Revision:October 26, 2016 Accepted:October 28, 2016 * 본 연구는 미래창조과학부 및 정보통신기술진흥센터의 SW특성화대학원 지원사업의 연구결과로 수행되었음(과제 번호 : R0346-16-1010). ** 숭실대학교 소프트웨어특성화대학원 석사과정, 교신저자 *** 숭실대학교 소프트웨어특성화대학원 교수 Recently, deep learning and machine learning have attracted considerable attention and many supporting frameworks appeared. In artificial intelligence field, a large body of research is underway to apply the relevant knowledge for complex problem-solving, necessitating the application of various learning algorithms and training methods to artificial intelligence systems. In addition, there is a dearth of performance evaluation of decision making agents. The decision making agent that can find optimal solutions by using reinforcement learning methods designed through this research can collect raw pixel data observed from dynamic environments and make decisions by itself based on the data. The decision making agent uses convolutional neural networks to classify situations it confronts, and the data observed from the environment undergoes preprocessing before being used. This research represents how the convolutional neural networks and the decision making agent are configured, analyzes learning performance through a value-based algorithm and a policy-based algorithm : a Deep Q-Networks and a Policy Gradient, sets forth their differences and demonstrates how the convolutional neural networks affect entire learning performance when using pixel data. This research is expected to contribute to the improvement of artificial intelligence systems which can efficiently find optimal solutions by using features extracted from raw pixel data. Keyword:Artificial Intelligence, Reinforcement Learning, CNN(Convolutional Neural Networks), DQN(Deep Q-Networks), PG(Policy Gradient) 韓國IT서비스學會誌 第15卷 第4號 2016年 12月, pp.85-95 86 Saemaro Moon.Yonglak Choi","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130715270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Financial Instruments Recommendation based on Classification Financial Consumer by Text Mining Techniques","authors":"Jaewoong Lee, Young-sik Kim, Ohbyung Kwon","doi":"10.9716/KITS.2016.15.4.001","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.4.001","url":null,"abstract":"Submitted:December 6, 2016 1 st Revision:December 19, 2016 Accepted:December 23, 2016 * 본 연구는 정부(미래창조과학부)의 재원으로 정보통신기술진흥센터의 지원을 받아 수행된 연구임(No. R0126-15-1007). ** 경희대학교 일반대학원 경영학과 *** 경희대학교 경영대학 경영연구원 연구원 **** 경희대학교 경영대학, 교신저자 With the innovation of information technology, non-face-to-face robo advisor with high accessibility and convenience is spreading. The current robot advisor recommends appropriate investment products after understanding the investment propensity based on the structured data entered directly or indirectly by individuals. However, it is an inconvenient and obtrusive way for financial consumers to inquire or input their own subjective propensity to invest. Hence, this study proposes a way to deduce the propensity to invest in unstructured data that customers voluntarily exposed during consultation or online. Since prediction performance based on unstructured document differs according to the characteristics of text, in this study, classification algorithm optimized for the characteristic of text left by financial consumers is selected by performing prediction performance evaluation of various learning discrimination algorithms and proposed an intelligent method that automatically recommends investment products. User tests were given to MBA students. After showing the recommended investment and list of investment products, satisfaction was asked. Financial consumers' satisfaction was measured by dividing them into investment propensity and recommendation goods. The results suggest that the users high satisfaction with investment products recommended by the method proposed in this paper. The results showed that it can be applies to non-face-to-face robo advisor. Keyword:Fintech, Robo-Advisor, Text Mining, Decision Tree, Random Forest, Machine learning 韓國IT서비스學會誌 第15卷 第4號 2016年 12月, pp.1-24 2 Jaewoong Lee.Young-Sik Kim.Ohbyung Kwon","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127721925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on the Security Framework Design for Stable Operation of Critical Infrastructure Service","authors":"Suyeon Lee, Jiyeon Yoo, Jong-in Lim","doi":"10.9716/KITS.2016.15.4.063","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.4.063","url":null,"abstract":"Critical infrastructure has been operating in a closed environment with a completely separate information system and in the private area. However, with the current ICT environment changes due to convergence and open platforms it has increased the threats and risks to critical infrastructure. The importance of cyber security is increasing in the infrastructure control system, such as the outbreak of Ukraine blackout in 2015 by a malicious code called 'black energy'. This thesis aims to recognize the importance and necessity of protecting the critical infrastructure service, designing a security framework reflecting environmental and characteristic changes, and analyzing the management system suitable for a security framework. We also propose a theoretical basis for constructing a new security framework by comparing and analyzing seven international security management system standards, such as NIST 800-82 and IEC 62443-2-1, which are used in the control system. As a result, the environment surrounding critical infrastructure changes with the characteristics of connectivity, openness, and finality was studied, and as a response to this, many scholars and institutions present critical infrastructure security frameworks as cycle enhancement type structures, risk management structures, and management domain expansion structures. In response, the security framework encompassing these structures, CISF (Critical Infrastructure Security Framework), was designed. Additionally, through the security related international standard and criterion analysis, as a newly designed security standard suitable for CISF, IEC 62443-2-1 is reviewed and suggestions are made.","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125788961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on the Factors Affecting the Intention to Use O2O Services","authors":"Y. Jeong, Y. Song","doi":"10.9716/KITS.2016.15.4.125","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.4.125","url":null,"abstract":"","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128263037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Utilization of Drone for Public Sector by Analysis of Drone Industry","authors":"Seungbae Sim, Hunyeong Kwon, Hosang Jung","doi":"10.9716/KITS.2016.15.4.025","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.4.025","url":null,"abstract":"","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127885139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Visual Recognition Enhancement of Yellow Carpet Placed at Near Pedestrian Crossing Areas : Visual Attention Software Implementation","authors":"Hyo-Sub Ahn, Jin-Tae Kim","doi":"10.9716/KITS.2016.15.4.073","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.4.073","url":null,"abstract":"Submitted:July 25, 2016 1 st Revision:October 10, 2016 Accepted:October 14, 2016 * 본 연구는 미래창조과학부 및 정보통신기술진흥센터의 ICT융합고급인력과정지원사업의 연구결과로 수행되었음 (IITP-2016-H8601-16-1008). ** 한국교통대학교 교통대학원 교통정책및시스템공학과 박사과정, 주저자 *** 한국교통대학교 교통대학원 교통시스템공학과 교수, 교신저자 韓國IT서비스學會誌 第15卷 第4號 2016年 12月, pp.73-83 74 Hyo-Sub Ahn.Jin-Tae Kim","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114433974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Case Study on the Success Factors of NPD Process Transformation : From IT to Automotive Product Development Process","authors":"Hyun Wook Lee, Jung-hee Han, B. Kim","doi":"10.9716/KITS.2016.15.4.175","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.4.175","url":null,"abstract":"","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124775026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effects of Servitization Acceptance on Performance through Mediation of Service Process & ICT Competency","authors":"Yong Yoon, Y. Kim","doi":"10.9716/KITS.2016.15.4.111","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.4.111","url":null,"abstract":"","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121121079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Sharing Economy Business Model per the Analysis of Value Attributes","authors":"Junmin Lee, Junseok Hwang, Jonglip Kim","doi":"10.9716/KITS.2016.15.4.153","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.4.153","url":null,"abstract":"economy' has rapidly emerged. Many startups have attempted to build promising business model based on the sharing economy concept. Nevertheless, successful cases are still very rare in the global level, except for Uber and Airbnb cases. Therefore, this study analyzes necessary causes and sufficient causes for successful settlements in the market through a comparative case analysis on digital matching firms in the sharing economy businesses. For the case study, we compare five successful cases (Uber, Airbnb, Kickstarter, TaskRabbit and DogVacay), three failure cases (Homejoy, Ridejoy and Tuterspree) and a platform cooperativism case (Juno) in accordance with six value attributes of business model including value proposition, market segment, value chain, cost structure and profit potential, value network and competitive strategy. We apply Boolean method to support controlled comparison and eliminate unnecessary attributes. The Boolean analysis result shows that value proposition, cost structure and profit potential, value network and competitive strategy are the essential attributes. Furthermore, the result indicates that each attribute is a necessary condition, where all four conditions should be met simultaneously in order to be successful. With this result, we discuss essential consideration for those who are planning startup based on the sharing economy business model.","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129138314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}