Journal of the Korea society of IT services最新文献

筛选
英文 中文
An Efficient Neighbor Discovery Method for Cooperative Video Surveillance Services in Internet of Vehicles 一种高效的车联网协同视频监控服务邻居发现方法
Journal of the Korea society of IT services Pub Date : 2016-12-31 DOI: 10.9716/KITS.2016.15.4.097
Taekeun Park, Suk-Kyoon Lee
{"title":"An Efficient Neighbor Discovery Method for Cooperative Video Surveillance Services in Internet of Vehicles","authors":"Taekeun Park, Suk-Kyoon Lee","doi":"10.9716/KITS.2016.15.4.097","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.4.097","url":null,"abstract":"The rapid deployment of millions of mobile sensors and smart devices has resulted in high demand for opportunistic encounter-based networking. For the cooperative video surveillance of dashboard cameras in nearby vehicles, a fast and energy-efficient asynchronous neighbor discovery protocol is indispensable because a dashboard camera is an energy-hungry device after the vehicle's engine has turned off. In the existing asynchronous neighbor discovery protocols, all nodes always try to discover all neighbors. However, a dashboard camera needs to discover nearby dashboard cameras when an event is detected. In this paper, we propose a fast and energy-efficient asynchronous neighbor discovery protocol, which enables nodes : 1) to have different roles in neighbor discovery, 2) to discover neighbors within a search range, and 3) to report promptly the exact discovery result. The proposed protocol has two modes: periodic wake-up mode and active discovery mode. A node begins with the periodic wake-up mode to be discovered by other nodes, switches to the active discovery mode on receiving a neighbor discovery request, and returns to the periodic wake-up mode when the active discovery mode finishes. In the periodic wake-up mode, a node wakes up at multiples of number α , where α is determined by the node’s remaining battery power. In the active discovery mode, a node wakes up for consecutive γ slots. Then, the node operating in the active discovery mode can discover all neighbors waking up at multiples of β for β ≤ γ within γ time slots. Since the proposed protocol assigns one half of the duty cycle to each mode, it consumes equal to or less energy than the existing protocols. A performance comparison shows that the proposed protocol outperforms the existing protocols in terms of discovery latency and energy consumption, where the frequency of neighbor discovery requests by car accidents is not constantly high.","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128223874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authorship Attribution of Web Texts with Korean Language Applying Deep Learning Method 基于深度学习方法的韩语网络文本作者归属研究
Journal of the Korea society of IT services Pub Date : 2016-09-30 DOI: 10.9716/KITS.2016.15.3.147
C. Park, In-Ho Jang, Zoon-Ky Lee
{"title":"Authorship Attribution of Web Texts with Korean Language Applying Deep Learning Method","authors":"C. Park, In-Ho Jang, Zoon-Ky Lee","doi":"10.9716/KITS.2016.15.3.147","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.3.147","url":null,"abstract":"According to rapid development of technology, web text is growing explosively and attracting many fields as substitution for survey. The user of Facebook is reaching up to 113 million people per month, Twitter is used in various institution or company as a behavioral analysis tool. However, many research has focused on meaning of the text itself. And there is a lack of study for text's creation subject. Therefore, this research consists of sex/age text classification with by using 20,187 Facebook users’ posts that reveal the sex and age of the writer. This research utilized Convolution Neural Networks, a type of deep learning algorithms which came into the spotlight as a recent image classifier in web text analyzing. The following result assured with 92% of accuracy for possibility as a text classifier. Also, this research was minimizing the Korean morpheme analysis and it was conducted using a Korean web text to Authorship Attribution. Based on these feature, this study can develop users' multiple capacity such as web text management information resource for worker, non-grammatical analyzing system for researchers. Thus, this study proposes a new method for web text analysis.","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131055340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Case Study on the Success Factors of B2C Reverse Auction Business Model B2C逆向拍卖商业模式成功因素的案例分析
Journal of the Korea society of IT services Pub Date : 2016-09-30 DOI: 10.9716/KITS.2016.15.3.247
Changhee Kim, G. Lee, Soowook Kim
{"title":"A Case Study on the Success Factors of B2C Reverse Auction Business Model","authors":"Changhee Kim, G. Lee, Soowook Kim","doi":"10.9716/KITS.2016.15.3.247","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.3.247","url":null,"abstract":"The purpose of the study is to derive success factors of B2C reverse auction business model, a business model contributes to the recent innovative practices in e-commerce and service sector. Electronic reverse auction has been traditionally used to ensure the procurement convenience and purchasing efficiency in B2B or B2G settings, however, e-RA is now expanding its basis toward B2C commerce industry along the huge success of an online e-RA travel service provider Priceline.com. Recently, B2C e-RA business model is getting the spotlight in the Korean venture industry with a variety of startups in diverse areas. However, e-RA does not work perfect in all kinds of trade settings. Therefore, we conducted a multiple case study to find out the success factors of B2C business model as follows : First, large supplier basis is an important factor that constructs a quasi-perfect competition environment. Second, the high online and mobile accessibility or e-readiness of Korean consumers was also a critical aspect of the success of e-RA. Lastly, e-RA performs best when the supplier switching cost is low and the trading occurs infrequently.","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132523738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Exploratory Study for Utilization of Copyrighted Public Records and Provision of Customer-Centered Services 版权公共记录利用与以客户为中心服务的探索性研究
Journal of the Korea society of IT services Pub Date : 2016-09-30 DOI: 10.9716/KITS.2016.15.3.223
M. Ryu, Tae H. Ahn
{"title":"An Exploratory Study for Utilization of Copyrighted Public Records and Provision of Customer-Centered Services","authors":"M. Ryu, Tae H. Ahn","doi":"10.9716/KITS.2016.15.3.223","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.3.223","url":null,"abstract":"This study defines copyrighted public records in broad sense including open government data and public domain except for some private records. Additionally, this study aims to investigate improvement plan for maximizing utilization of copyrighted public records in web-sites using customer side, without consideration of supplier side. For this purpose, qualitative study method was used with grounded theory on analyzed problems from literature review and case study. Literature review was concentrated on definition of open data and abroad utilization indicators whereas case study analyzed current situation of four web-sites providing copyrighted public records. Converged opinions from in-depth interview and various statistical data was analyzed as a basis for grounded theory, then a paradigm model was constructed and future improvement plans were presented. The findings imply that opening of copyrighted public records is not just important for quantitative results, rather it requires qualitative improvement providing latest credible information that is consistent with the demand of the customer. Thus, development of service platform and business models for copyrighted public records are urgent task.","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129468120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effect of Information Security Certification Announcement on the Market Value of Firms
Journal of the Korea society of IT services Pub Date : 2016-09-30 DOI: 10.9716/KITS.2016.15.3.051
Jae-young Park, Woojin Jung, Beomsoo Kim
{"title":"The Effect of Information Security Certification Announcement on the Market Value of Firms","authors":"Jae-young Park, Woojin Jung, Beomsoo Kim","doi":"10.9716/KITS.2016.15.3.051","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.3.051","url":null,"abstract":"Recently, many Korean firms have suffered financial losses and damaged firm's trust due to information security incidents. Hence, a lot of firms have realized the importance of the information security. In particular, the demand for information security certification has increased. This study examined the effect of information security certification using the event study methodology. Our research shows that the announcement of the information security certification significantly influences the market value of the corresponding firm. The certified firms rise, on average, o.4993% (-2 day), 0.5462% (+1 day) of their market value. Further, we found that the financial sector in our data showed a 1.4% higher abnormal returns than the nonfinancial sector. On the other hand, whether a firm first acquired the information security certification is not significant. Our paper presents that it is possible to analyze the effect of the information security certification using the event study. We are expected to be used in making a decision for the investment of information security. Also, our results indicate that the firm which have acquired the information security certification","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124018117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Character Identification Method using Postpositions for Animate Nouns in Korean Novels 韩文小说中动画名词后置词的人物识别方法
Journal of the Korea society of IT services Pub Date : 2016-09-30 DOI: 10.9716/KITS.2016.15.3.115
Taekeun Park, Seung-Hoon Kim
{"title":"A Character Identification Method using Postpositions for Animate Nouns in Korean Novels","authors":"Taekeun Park, Seung-Hoon Kim","doi":"10.9716/KITS.2016.15.3.115","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.3.115","url":null,"abstract":"Submitted:June 20, 2016 1 st Revision:July 20, 2016 Accepted:July 26, 2016 * 본 연구는 문화체육관광부 및 한국콘텐츠진흥원의 2016년도 문화기술 연구개발 지원사업으로 수행되었음. ** 단국대학교 응용컴퓨터공학과 교수, 교신저자 ***단국대학교 응용컴퓨터공학과 교수 Novels includes various character names, depending on the genre and the spatio-temporal background of the novels and the nationality of characters. Besides, characters and their names in a novel are created by the author’s pen and imagination. As a result, any proper noun dictionary cannot include all kind of character names which have been created or will be created by authors. In addition, since Korean does not have capitalization feature, character names in Korean are harder to detect than those in English. Fortunately, however, Korean has postpositions, such as “-ege” and “hante”, used by a sentient being or an animate object (noun). We call such postpositions as animate postpositions in this paper. In a previous study, the authors manually selected character names by referencing both Wikipedia and well-known people dictionaries after utilizing Korean morpheme analyzer, a proper noun dictionary, postpositions (e.g., “-ga”, “-eun”, “-neun”, “-eui”, and “-ege”), and titles (e.g., “buin”), in order to extract social networks from three novels translated into or written in Korean. But, the precision, recall, and F-measure rates of character identification are not presented in the study. In this paper, we evaluate the quantitative contribution of animate postpositions to character identification from novels, in terms of precision, recall, and F-measure. The results show that utilizing animate postpositions is a valuable and powerful tool in character identification without a proper noun dictionary from novels translated into or written in Korean. Keyword:Information Extraction, Korean Novels, Character Identification, Postpositions for Animate Nouns, Korean Linguistic Feature 韓國IT서비스學會誌 第15卷 第3號 2016年 9月, pp.115-125 116 Taekeun Park.Seung-Hoon Kim","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122831676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Study on the Factors Influencing on the Salesperson's Resistance to SFA 销售员对SFA抗拒的影响因素研究
Journal of the Korea society of IT services Pub Date : 2016-09-30 DOI: 10.9716/KITS.2016.15.3.015
C. Park, Liang Li, A. Cho
{"title":"A Study on the Factors Influencing on the Salesperson's Resistance to SFA","authors":"C. Park, Liang Li, A. Cho","doi":"10.9716/KITS.2016.15.3.015","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.3.015","url":null,"abstract":"Sales Force Automation (SFA) is a strategic information system and one of the components of operational CRM system. SFA supports salespeople’s activities such as selection of potential customers, creative value proposition, after-sales services, etc. SFA is increasingly used in many companies because it has the advantages to raise the salespeople’s productivity by developing forecasting ability, value proposition ability, after sales service ability etc. Many researches have shown that implementation of SFA leads to the increase of salepeople performance, organizational performance, and quality of customer relationship. However, Some prior studies have discussed on the SFA implementation failure and pointed out that one of important causes of this failure is salespeople’s resistance to SFA. Although many researches explain SFA acceptance phenomenon using Technology Acceptance Model (TAM) and Theory of Planned Behavior (TPB), these researches didn’t deeply investigate the salespeople’s resistance to SFA. Therefore, this study focuses on the factors influencing salespeople’s resistance to SFA and the relationships among these factors. This study identified three factors (salespeople’s perceived loss of power, perceived loss of autonomy, and perceived time and effort waste) influencing salespeople’s resistance to SFA. The hypotheses testing results showed that salespeople’s perceived loss of power and perceived time and effort waste significantly increased salespeople’s resistance to SFA. And salespeople’s perceived loss of power plays a mediating role between perceived loss of autonomy/perceived time and effort waste and salespeople’s resistance to SFA. At the end of the paper, theoretical and managerial implications of this study and the limitations and future research directions are discussed.","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114740045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Relationship Between SNS and Firm's Brand Trust in B2B Context B2B情境下社交网络与企业品牌信任的关系
Journal of the Korea society of IT services Pub Date : 2016-09-30 DOI: 10.9716/KITS.2016.15.3.127
Ji Hye Kim, W. Lee, Y. Kang
{"title":"The Relationship Between SNS and Firm's Brand Trust in B2B Context","authors":"Ji Hye Kim, W. Lee, Y. Kang","doi":"10.9716/KITS.2016.15.3.127","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.3.127","url":null,"abstract":"This paper aims to investigate empirically how brand trust can be formed from the customer-brand relationship through a direct use of firm’s SNS in B2B context. The brand trust is fundamental elements to understanding of long-term relationship in a B2B context. To achieve the objectives of this study, data collection is through a personally administered questionnaire, and a total of 180 questionnaires was collected from the buyer or supplier who frequently visited partner’s firm SNS. Excluding missing data, 120 usable data were analyzed. From the results, first, three SNS motivations (i.e. Information, social and entertainment) has a positive impact on the perceived value of SNS (i.e. perceived usefulness and perceived enjoyment). Second, the perceived usefulness and perceived enjoyment positively affect customer-brand relationship (brand intimacy, brand attachment). Third, the customer-brand relationship is positively related to brand trust. Implications, limitations and future research directions of the study were also discussed. These findings help managers in developing and implementing the relation between SNS use and a customer-brand relationship for long-term relationship in B2B.","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130087401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing Data Openness Evaluation Index for Intelligent IT Service 构建面向智能IT服务的数据开放性评价指标
Journal of the Korea society of IT services Pub Date : 2016-09-30 DOI: 10.9716/KITS.2016.15.3.097
Y. Jin, O. Kwon
{"title":"Developing Data Openness Evaluation Index for Intelligent IT Service","authors":"Y. Jin, O. Kwon","doi":"10.9716/KITS.2016.15.3.097","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.3.097","url":null,"abstract":"","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133270483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the New Management System Considering Shadow IT 考虑影子IT的新管理体系研究
Journal of the Korea society of IT services Pub Date : 2016-09-30 DOI: 10.9716/KITS.2016.15.3.033
Jiyeon Yoo, Na-Young Jeong
{"title":"A Study on the New Management System Considering Shadow IT","authors":"Jiyeon Yoo, Na-Young Jeong","doi":"10.9716/KITS.2016.15.3.033","DOIUrl":"https://doi.org/10.9716/KITS.2016.15.3.033","url":null,"abstract":"* 상명대학교 일반대학원 지식보안경영학과 ** 상명대학교 경영대학원 석사과정 In a dynamic IT environment, employees often utilize external IT resources to work more efficiently and flexibly. However, the use of external IT resources beyond its control may cause difficulties in the company. This is known as “Shadow IT.” In spite of efficiency gains or cost savings, Shadow IT presents problems for companies such as the outflow of enterprise data. To address these problems, appropriate measures are required to maintain a balance between flexibility and control. Therefore, in this study, we developed a new information security management system called AIIMS (Advanced IT service & Information security Management System) and the Shadow IT Evaluation Model. The proposed model reflects a Shadow IT’s attributes such as innovativeness, effectiveness, and ripple effect. AIIMS consists of five fields: current analysis; Shadow IT management plans; management process; education and training; and internal audit. There are additional management items and sub-items within these five fields. Using AIIMS, we expect to not only mitigate the potential risks of Shadow IT but also create successful business outcomes. Now is the time to draw to the Light in","PeriodicalId":272384,"journal":{"name":"Journal of the Korea society of IT services","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115443112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信