http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
김태경,김창식,Kim, Taekyung,Kim, Changsik 디지털산업정보학회 2018 디지털산업정보학회논문지 Vol.14 No.2
With the development of IT technology, various services such as artificial intelligence and autonomous vehicles are being introduced, and many changes are taking place in our lives. However, if secure security is not provided, it will cause many risks, so the information security becomes more important. In this paper, we analyzed the research trends of main themes of information security over time. In order to conduct the research, 'Information Security' was searched in the Web of Science database. Using the abstracts of theses published from 1991 to 2016, we derived main research topics through topic modeling and time series regression analysis. The topic modeling results showed that the research topics were Information technology, system access, attack, threat, risk management, network type, security management, security awareness, certification level, information protection organization, security policy, access control, personal information, security investment, computing environment, investment cost, system structure, authentication method, user behavior, encryption. The time series regression results indicated that all the topics were hot topics.
디지털 이미지 증거에서 사건과 무관한 파일 삭제시 무결성 제공 방안 연구
김태경,Kim, TaeKyung 디지털산업정보학회 2019 디지털산업정보학회논문지 Vol.15 No.4
The digital forensic analysis ensures the integrity of confiscated data by calculating hash values for seizure and search of digital evidence and receiving confirmation and signature from participants. However, evidence that is irrelevant to the alleged offense needs to be deleted even after seizure from the point of view of privacy. But the hash value is altered by deleting the irrelevant data from the image file, one will not be able to prove that the file is in the initial state when it was seized. Therefore, in this paper, a study was conducted to support the integrity of the digital evidence, even if some of the seized digital evidence was deleted or damaged during the seizure search. The hash value of each data is calculated and hash value of the combination of hash values are also calculated. Even if the unrelated evidence is deleted from the seized evidence regardless of file system such as FAT or NTFS, the suggested method presented a way to provide the integrity that proves there is no change in the evidence file.
김태경,Kim, Taekyung 디지털산업정보학회 2016 디지털산업정보학회논문지 Vol.12 No.4
In the area of hotel and tourism sector, various research are analyzed using big data. Big data is being generated by any digital devices around us all the times. All the digital process and social media exchange produces the big data. In this paper, we analyzed the de-identification method of big data to use the personal information of hotel guests. Through the analysis of these big data, hotel can provide differentiated and diverse services to hotel guests and can improve the service and support the marketing of hotels. If the hotel wants to use the information of the guest, the private data should be de-identified. There are several de-identification methods of personal information such as pseudonymisation, aggregation, data reduction, data suppression and data masking. Using the comparison of these methods, the pseudonymisation is discriminated to the suitable methods for the analysis of information for the hotel guest. Also, among the pseudonymisation methods, the t-closeness was analyzed to the secure and efficient method for the de-identification of personal information in hotel.
김태경,Kim, Taekyung 디지털산업정보학회 2016 디지털산업정보학회논문지 Vol.12 No.2
Owing to the change of economic trends, the importance of the tourism industry is growing more and more. In particular, the number of foreign tourists continues to increase and the type of tourists is being changed into FIT (Foreign Independent Traveler). Therefore it is an important issue to provide the effective information to foreign tourists. To solve these problems, a variety of IT technology is being used in the tourism information systems. Especially the location based tour information service is being emerged. This kinds of tourism information service is a type of LBS (Location Based Services). But if the security of the location based tourism information service is not guaranteed, it can lead to many dangers. In this paper, the trends of location based tourism information service are surveyed. Also the security threats and countermeasures for the location based tourism information service are analyzed. This paper suggests secret considerations for the location based tourism information service.
김태경,Kim, Taekyung 디지털산업정보학회 2015 디지털산업정보학회논문지 Vol.11 No.2
As new Information technology such as IoT develops rapidly, a lot of changes are occurred in our lives. The Internet of Things is the network of physical objects or things embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected devices. This change is also applied to tourism industry. These days many people make a tour reservation using the internet. But it is required to consider the efficiency and security of tour reservation system. In this paper, we suggest a tour reservation system. First, we describe the computer reservation system, hotel reservation system and reservation system. Second, we perform the modeling of general reservation system and suggested reservation system. Third, performance evaluation is carried out with respect to efficiency and security. The results show that the suggested reservation system has a better performance than a general reservation system. At last we described the results and future works.
창업투자회사의 벤처 기업 창출 기여에 관한 시계열 분석
김태경,Kim, Taekyung 한국벤처창업학회 2014 벤처창업연구 Vol.9 No.6
창업은 일자리 창출과 신성장 동력 발굴의 적극적인 대안으로 인식되어 왔으며 창업투자회사는 이러한 활동에 주요한 역할을 담당할 것으로 기대된다. 그럼에도 불구하고 창업투자회사의 활동과 창업 활동 간의 상관관계에 대한 학계의 실증적 분석은 부족한 실태다. 1998년부터 2014년까지의 시계열 데이터를 분석한 결과 본 연구는 창업투자회사가 벤처 기업 창업을 양적으로 견인한 인과성이 있음을 밝혔다. 또한 벤처 기업의 창업이 청년 실업 문제를 단기간에 해소하기에는 부족하다는 것과 산업별 벤처 기업과 청년 실업 간의 관계가 다르다는 점도 발견했다. 본 연구는 창업투자활동과 벤처 창업 간의 상관성을 시계열적으로 고려하고 인과분석 시도함으로써 창업투자회사 육성에 관련된 연구와 전략 개발 그리고 정책 수립에 시사점을 준다. The creation of new venture firm has been regarded as a key of creating more job opportunities and discovering new value engines for various industries. It is positively expected that venture capitals play an important role of supporting the process. Nevertheless, there is a scant of research efforts to analyze empirical data for understanding cross-correlations between investment of venture capital and new venture foundation. To fill the gap, this study investigated sets of time-series data from 1998 to 2014 in the context of South Korean economy. The results reveal that venture capitals have contributed significantly to the quantitative increase of venture firms. In addition, the findings show that the creation of new venture fails to yield a direct impact on resolving young unemployment problems in short term. The paper contributes to the research community on new venture foundation by providing insightful views.
김태경(Taekyung Kim),박진수(Jinsoo Park),노상규(Sangkyu Rho) 한국전자거래학회 2013 한국전자거래학회지 Vol.18 No.1
개념적 모델링은 성공적인 비즈니스 정보 시스템을 개발하기 위한 중요한 활동이다. 본 연구의 목적은 개념적 모델링 활동에 있어서 근거연구로부터 도입한 지속비교 방법을 적용하는 것에 관한 가능성을 평가하는 것이다. 이를 알아보기 위해, 우리는 초심 모델러를 훈련시키고 두 그룹으로 나누어 사후 평가를 실시했다. 실험 결과는 지속비교 방법을 훈련받고 이를 적용한 그룹이 그렇지 않은 그룹보다 경험이 많은 모델러에게 더 호의적인 평가를 받는다는 점을 보여주었다. 더욱이, 통제 그룹은 도메인 지식에 대해 덜 친숙할수록 문제해결에 어려움을 겪었지만, 실험 그룹은 어려움에 더 잘 대처했다. 또한 지속비교 방법의 적용은 개념적 모델링의 분석 시간을 단축시켰다. Conceptual modeling is a critical activity for developing successful business information systems. The objective of this study is to evaluate the possibility of applying the constant comparison method from the grounded theory to conceptual modeling. To achieve the objective, we trained novice modelers and split them into two groups for evaluation. The experimental results show that applying the constant comparison method could increase acceptability from more experienced conceptual modelers. Moreover, while the control group was experienced difficulties when domain knowledge is unfamiliar, the experimental group could handle difficulties more effectively. In addition, applying the constant comparison method also decreased the time to complete analysis for conceptual modeling.