RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        텍스트마이닝을 이용한 정보보호 연구동향 분석

        김태경,김창식,Kim, Taekyung,Kim, Changsik 디지털산업정보학회 2018 디지털산업정보학회논문지 Vol.14 No.2

        With the development of IT technology, various services such as artificial intelligence and autonomous vehicles are being introduced, and many changes are taking place in our lives. However, if secure security is not provided, it will cause many risks, so the information security becomes more important. In this paper, we analyzed the research trends of main themes of information security over time. In order to conduct the research, 'Information Security' was searched in the Web of Science database. Using the abstracts of theses published from 1991 to 2016, we derived main research topics through topic modeling and time series regression analysis. The topic modeling results showed that the research topics were Information technology, system access, attack, threat, risk management, network type, security management, security awareness, certification level, information protection organization, security policy, access control, personal information, security investment, computing environment, investment cost, system structure, authentication method, user behavior, encryption. The time series regression results indicated that all the topics were hot topics.

      • KCI등재

        디지털 이미지 증거에서 사건과 무관한 파일 삭제시 무결성 제공 방안 연구

        김태경,Kim, TaeKyung 디지털산업정보학회 2019 디지털산업정보학회논문지 Vol.15 No.4

        The digital forensic analysis ensures the integrity of confiscated data by calculating hash values for seizure and search of digital evidence and receiving confirmation and signature from participants. However, evidence that is irrelevant to the alleged offense needs to be deleted even after seizure from the point of view of privacy. But the hash value is altered by deleting the irrelevant data from the image file, one will not be able to prove that the file is in the initial state when it was seized. Therefore, in this paper, a study was conducted to support the integrity of the digital evidence, even if some of the seized digital evidence was deleted or damaged during the seizure search. The hash value of each data is calculated and hash value of the combination of hash values are also calculated. Even if the unrelated evidence is deleted from the seized evidence regardless of file system such as FAT or NTFS, the suggested method presented a way to provide the integrity that proves there is no change in the evidence file.

      • KCI등재

        호텔 이용 고객의 개인정보 비식별화 방안에 관한 연구

        김태경,Kim, Taekyung 디지털산업정보학회 2016 디지털산업정보학회논문지 Vol.12 No.4

        In the area of hotel and tourism sector, various research are analyzed using big data. Big data is being generated by any digital devices around us all the times. All the digital process and social media exchange produces the big data. In this paper, we analyzed the de-identification method of big data to use the personal information of hotel guests. Through the analysis of these big data, hotel can provide differentiated and diverse services to hotel guests and can improve the service and support the marketing of hotels. If the hotel wants to use the information of the guest, the private data should be de-identified. There are several de-identification methods of personal information such as pseudonymisation, aggregation, data reduction, data suppression and data masking. Using the comparison of these methods, the pseudonymisation is discriminated to the suitable methods for the analysis of information for the hotel guest. Also, among the pseudonymisation methods, the t-closeness was analyzed to the secure and efficient method for the de-identification of personal information in hotel.

      • KCI등재

        위치 기반 관광 정보 서비스 보안 기술 연구

        김태경,Kim, Taekyung 디지털산업정보학회 2016 디지털산업정보학회논문지 Vol.12 No.2

        Owing to the change of economic trends, the importance of the tourism industry is growing more and more. In particular, the number of foreign tourists continues to increase and the type of tourists is being changed into FIT (Foreign Independent Traveler). Therefore it is an important issue to provide the effective information to foreign tourists. To solve these problems, a variety of IT technology is being used in the tourism information systems. Especially the location based tour information service is being emerged. This kinds of tourism information service is a type of LBS (Location Based Services). But if the security of the location based tourism information service is not guaranteed, it can lead to many dangers. In this paper, the trends of location based tourism information service are surveyed. Also the security threats and countermeasures for the location based tourism information service are analyzed. This paper suggests secret considerations for the location based tourism information service.

      • KCI등재

        보안 및 효율성을 고려한 관광 예약 정보 시스템

        김태경,Kim, Taekyung 디지털산업정보학회 2015 디지털산업정보학회논문지 Vol.11 No.2

        As new Information technology such as IoT develops rapidly, a lot of changes are occurred in our lives. The Internet of Things is the network of physical objects or things embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected devices. This change is also applied to tourism industry. These days many people make a tour reservation using the internet. But it is required to consider the efficiency and security of tour reservation system. In this paper, we suggest a tour reservation system. First, we describe the computer reservation system, hotel reservation system and reservation system. Second, we perform the modeling of general reservation system and suggested reservation system. Third, performance evaluation is carried out with respect to efficiency and security. The results show that the suggested reservation system has a better performance than a general reservation system. At last we described the results and future works.

      • KCI등재

        창업투자회사의 벤처 기업 창출 기여에 관한 시계열 분석

        김태경,Kim, Taekyung 한국벤처창업학회 2014 벤처창업연구 Vol.9 No.6

        창업은 일자리 창출과 신성장 동력 발굴의 적극적인 대안으로 인식되어 왔으며 창업투자회사는 이러한 활동에 주요한 역할을 담당할 것으로 기대된다. 그럼에도 불구하고 창업투자회사의 활동과 창업 활동 간의 상관관계에 대한 학계의 실증적 분석은 부족한 실태다. 1998년부터 2014년까지의 시계열 데이터를 분석한 결과 본 연구는 창업투자회사가 벤처 기업 창업을 양적으로 견인한 인과성이 있음을 밝혔다. 또한 벤처 기업의 창업이 청년 실업 문제를 단기간에 해소하기에는 부족하다는 것과 산업별 벤처 기업과 청년 실업 간의 관계가 다르다는 점도 발견했다. 본 연구는 창업투자활동과 벤처 창업 간의 상관성을 시계열적으로 고려하고 인과분석 시도함으로써 창업투자회사 육성에 관련된 연구와 전략 개발 그리고 정책 수립에 시사점을 준다. The creation of new venture firm has been regarded as a key of creating more job opportunities and discovering new value engines for various industries. It is positively expected that venture capitals play an important role of supporting the process. Nevertheless, there is a scant of research efforts to analyze empirical data for understanding cross-correlations between investment of venture capital and new venture foundation. To fill the gap, this study investigated sets of time-series data from 1998 to 2014 in the context of South Korean economy. The results reveal that venture capitals have contributed significantly to the quantitative increase of venture firms. In addition, the findings show that the creation of new venture fails to yield a direct impact on resolving young unemployment problems in short term. The paper contributes to the research community on new venture foundation by providing insightful views.

      • KCI우수등재

        지속비교 방법에 관한 연구

        김태경(Taekyung Kim),박진수(Jinsoo Park),노상규(Sangkyu Rho) 한국전자거래학회 2013 한국전자거래학회지 Vol.18 No.1

        개념적 모델링은 성공적인 비즈니스 정보 시스템을 개발하기 위한 중요한 활동이다. 본 연구의 목적은 개념적 모델링 활동에 있어서 근거연구로부터 도입한 지속비교 방법을 적용하는 것에 관한 가능성을 평가하는 것이다. 이를 알아보기 위해, 우리는 초심 모델러를 훈련시키고 두 그룹으로 나누어 사후 평가를 실시했다. 실험 결과는 지속비교 방법을 훈련받고 이를 적용한 그룹이 그렇지 않은 그룹보다 경험이 많은 모델러에게 더 호의적인 평가를 받는다는 점을 보여주었다. 더욱이, 통제 그룹은 도메인 지식에 대해 덜 친숙할수록 문제해결에 어려움을 겪었지만, 실험 그룹은 어려움에 더 잘 대처했다. 또한 지속비교 방법의 적용은 개념적 모델링의 분석 시간을 단축시켰다. Conceptual modeling is a critical activity for developing successful business information systems. The objective of this study is to evaluate the possibility of applying the constant comparison method from the grounded theory to conceptual modeling. To achieve the objective, we trained novice modelers and split them into two groups for evaluation. The experimental results show that applying the constant comparison method could increase acceptability from more experienced conceptual modelers. Moreover, while the control group was experienced difficulties when domain knowledge is unfamiliar, the experimental group could handle difficulties more effectively. In addition, applying the constant comparison method also decreased the time to complete analysis for conceptual modeling.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼