• Title/Summary/Keyword: 개인정보관리모델

Search Result 349, Processing Time 0.029 seconds

The Analysis of Job Stress of Workers in the Architectural Design Firm After the Introduction of BIM (BIM 도입 후 설계사무소 실무자들의 직무스트레스 분석)

  • Seo, Hee-Chang;Oh, Jung-Keun;Kim, Jea-Jun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.13 no.4
    • /
    • pp.120-131
    • /
    • 2012
  • Today, companies exist amid unlimited competition and uncertain adminstration environment, so hands-on workers are being exposed to various job requirements and stress due to this. Especially, employees in the design firm are physically difficult because of heavy working intensity unlike other industrial field, and because the process is interrelated unlike working of a five-day workday of the other industry, it is difficult to guarantee periodic holidays and vacation. In addition, recently, while BIM is introduced in the construction industry, various changes in the individual role as well as organizational dimension such as business environment and scope & role, etc. are required, so it is the actual situation that the category and factors of job stress due to this are being also changed. Accordingly, this research has grasped important and weak sectors according to characteristics such as career, position, gender, education and existence/nonexistence of BIM template, etc. by confirming a job stress level and inducing factors of hands-on workers at the design firm. This research has a meaning in constructing a business environment of a design firm that is a main participant of BIM-based projects that are expected to have high utilization in the future.

A personalized TV service under Open network environment (개방형 환경에서의 개인 맞춤형 TV 서비스)

  • Lye, Ji-Hye;Pyo, Sin-Ji;Im, Jeong-Yeon;Kim, Mun-Churl;Lim, Sun-Hwan;Kim, Sang-Ki
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.279-282
    • /
    • 2006
  • IP망을 이용한 IPTV 방송 서비스가 새로운 수익 모델로 인정받고 현재 국내의 KT, SKT 등이 IPTV 시범서비스를 준비하거나 진행 중에 있다 이 IPTV 서비스는 이전의 단방향 방송과는 달리 사용자와의 인터렉션을 중시하는 양방향 방송을 표방하기 때문에 지금까지의 방송과는 다른 혁신적인 방송서비스가 기대된다. 하지만 IPTV 서비스에 있어서 여러 통신사와 방송사가 참여할 수 있을 것으로 보여지는 것과는 달리 실상은 몇몇 거대 통신기업이 자신들의 망을 이용하는 가입자들을 상대로 한정된 사업을 벌이고 있다. 이는 IPTV 서비스를 위한 인프라가 구축되어 있지 않고 방통융합망의 개념을 만족시키기 위해 서비스 개발자가 알아야 할 프로토콜들이 너무나 많기 때문이다. 따라서 본 논문에서는 이러한 상황을 타개할 수 있는 수단을 Open API로 제안한다. 맞춤형 방송을 위한 시나리오를 TV-Anytime의 벤치마킹과 유저 시나리오를 참고하여 재구성하고 이 시나리오로부터 IPTV 방송 서비스를 위한 방통융합망의 기본적이고 강력한 기능들을 Open API 함수로 정의하였다. 여기에서의 방송 서비스는 NDR, EPG, 개인 맞춤형 광고 서비스를 말하며 각 서비스를 위한 서버는 통합망 위에 존재하고 이 서버들이 개방하는 API들은 다른 응용프로그램에 의해 사용되는 것이기 때문에 가장 기본적인 기능을 정의하게 된다. 또한, 제안한 Open API 함수를 이용하여 개인 맞춤형 방송 응용 서비스를 구현함으로써 서비스 검증을 하였다. Open API는 웹서비스를 통해 공개된 기능들로써 게이트웨이를 통해 다른 망에서 사용할 수 있게 된다. Open API 함수의 정의는 함수 이름, 기능, 입 출력 파라메터로 이루어져 있다. 사용자 맞춤 서비스를 위해 전달되는 사용자 상세 정보와 콘텐츠 상세 정보는 TV-Anytime 포럼에서 정의한 메타데이터 스키마를 이용하여 정의하였다.가능하게 한다. 제안된 방법은 프레임 간 모드 결정을 고속화함으로써 스케일러블 비디오 부호화기의 연산량과 복잡도를 최대 57%감소시킨다. 그러나 연산량 감소에 따른 비트율의 증가나 화질의 열화는 최대 1.74% 비트율 증가 및 0.08dB PSNR 감소로 무시할 정도로 작다., 반드시 이에 대한 검증이 필요함을 알 수 있었다. 현지관측에 비해 막대한 비용과 시간을 절약할 수 있는 위성영상해석방법을 이용한 방법은 해양수질파악이 가능할 것으로 판단되며, GIS를 이용하여 다양하고 복잡한 자료를 데이터베이스화함으로써 가시화하고, 이를 기초로 공간분석을 실시함으로써 환경요소별 공간분포에 대한 파악을 통해 수치모형실험을 이용한 각종 환경영향의 평가 및 예측을 위한 기초자료로 이용이 가능할 것으로 사료된다.염총량관리 기본계획 시 구축된 모형 매개변수를 바탕으로 분석을 수행하였다. 일차오차분석을 이용하여 수리매개변수와 수질매개변수의 수질항목별 상대적 기여도를 파악해 본 결과, 수리매개변수는 DO, BOD, 유기질소, 유기인 모든 항목에 일정 정도의 상대적 기여도를 가지고 있는 것을 알 수 있었다. 이로부터 수질 모형의 적용 시 수리 매개변수 또한 수질 매개변수의 추정 시와 같이 보다 세심한 주의를 기울여 추정할 필요가 있을 것으로 판단된다.변화와 기흉 발생과의 인과관계를 확인하고 좀 더 구체화하기 위한 연구가 필요할 것이다.게 이루어질 수 있을 것으로 기대된다.는 초과수익률이 상승하지만, 이후로는 감소하므로, 반전거래전략을 활용하는 경우 주식투자기간은 24개월이하의 중단기가 적합함을 발견하였다. 이상의 행태적 측면과 투자성과측면의 실증결과를 통하여 한국주식시장에 있어서 시장수익률을 평균적으로 초과할 수 있는 거래전략은 존재하므로 이러한 전략을 개발 및 활용할 수 있으며, 특히, 한국주식시장에 적합한 거래전략은 반전거래전략이고, 이 전략의 유용성은 투자자가 설정한 투자기간보다

  • PDF

Security-Enhanced Local Process Execution Scheme in Cloud Computing Environments (클라우드 컴퓨팅 환경에서 보안성 향상을 위한 로컬 프로세스 실행 기술)

  • Kim, Tae-Hyoung;Kim, In-Hyuk;Kim, Jung-Han;Min, Chang-Woo;Kim, Jee-Hong;Eom, Young-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.69-79
    • /
    • 2010
  • In the current cloud environments, the applications are executed on the remote cloud server, and they also utilize computing resources of the remote cloud server such as physical memory and CPU. Therefore, if remote server is exposed to security threat, every applications in remote server can be victim by several security-attacks. Especially, despite many advantages, both individuals and businesses often have trouble to start the cloud services according to the malicious administrator of the cloud server. We propose a security-enhanced local process executing scheme resolving vulnerability of current cloud computing environments. Since secret data is stored in the local, we can protect secret data from security threats of the cloud server. By utilizing computing resource of local computer instead of remote server, high-secure processes can be set free from vulnerability of remote server.

A Study Covering the Comparative Analysis of Educational Systems in Major Countries for Regular Cybersecurity Education (사이버보안 정규교육화를 위한 주요국 교육체계 비교분석 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.397-405
    • /
    • 2021
  • With the recent phenomenon of the Intelligence Information Society, the cyber security paradigm has begun to change. In particular, the increase of the interconnectedness of the hyperlinked society has extended the scope of damage that can be caused by cyber threats to the real world. In addition to that, it can also be a risk to any given individual who could accompany a crisis that has to do with public safety or national security. Adolescents who are digital natives are more likely to be exposed to cyber threats, which is mainly due to the fact that they are significantly more involved in cyber activities and they also possess insufficient security comprehension and safety awareness. Therefore, it is necessary to strengthen cyber security capabilities of every young individual, so that they can effectively protect themselves against cyber threats and better manage their cyber activities. It examines the changes of the security paradigm and the necessity for cyber security education, which is in direct accordance to the characteristics of a connected society that further suggests directions and a basic system of cyber security education, through a detailed analysis of the current state of Domestic and Overseas Cyber Security Education. The purpose of this study was to define cybersecurity competencies that are necessary within an intelligent information society, and to propose a regular curriculum for strengthening cybersecurity competencies, through the comparison and meticulous analysis of both domestic and overseas educational systems that are pertinent to cybersecurity competencies. Accordingly, a cybersecurity competency system was constructed, by reflecting C3-Matrix, which is a cyber competency system model of digital citizens. The cybersecurity competency system consists of cyber ethics awareness, cyber ethics behavior, cyber security and cyber safety. In addition to this, based on the basic framework of the cybersecurity competency system, the relevant education that is currently being implemented in the United States, Australia, Japan and Korea were all compared and analyzed. From the insight gained through the analysis, the domestic curriculum was finally presented. The main objective of this new unified understanding, was to create a comprehensive and effective cyber security competency curriculum.

Analysis and Management of Potential Development Area Using Factor of Change from Forest to Build-up (산림의 시가지 변화요인을 통한 잠재개발지 분석 및 관리방안)

  • LEE, Ji-Yeon;LIM, No-Ol;LEE, Sung-Joo;CHO, Hyo-Jin;SUNG, Hyun-Chan;JEON, Seong-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.25 no.2
    • /
    • pp.72-87
    • /
    • 2022
  • For the sustainable development and conservation of the national land, planned development and efficient environmental conservation must be accompanied. To this end, it is possible to induce development and conservation to harmonize by deriving factors affecting development through analysis of previously developed areas and applying appropriate management measures to areas with high development pressure. In this study, the relationship between the area where the land cover changed from forest to urbanization and various social, geographical, and restrictive factors was implemented in a regression formula through logistic regression analysis, and potential development sites were analyzed for Yongin City. The factor that has the greatest impact on the analysis of potential development area is the restrict factors such as Green Belt and protected areas, and the factor with the least impact is the population density. About 148km2(52%) of Yongin-si's forests were analyzed as potential development area. Among the potential development sites, the area with excellent environmental value as a protected area and 1st grade on the Environment Conservation Value Assessment Map was derived as about 13km2. Protected areas with high development potential were riparian buffer zone and special measurement area, and areas with excellent natural scenery and river were preferred as development areas. Protected areas allow certain actions to protect individual property rights. However, there is no clear permit criteria, and the environmental impact of permits is not understood. This is identified as a factor that prevents protected areas from functioning properly. Therefore, it needs to be managed through clear exception permit criteria and environmental impact monitoring.

Directions of Implementing Documentation Strategies for Local Regions (지역 기록화를 위한 도큐멘테이션 전략의 적용)

  • Seol, Moon-Won
    • The Korean Journal of Archival Studies
    • /
    • no.26
    • /
    • pp.103-149
    • /
    • 2010
  • Documentation strategy has been experimented in various subject areas and local regions since late 1980's when it was proposed as archival appraisal and selection methods by archival communities in the United States. Though it was criticized to be too ideal, it needs to shed new light on the potentialities of the strategy for documenting local regions in digital environment. The purpose of this study is to analyse the implementation issues of documentation strategy and to suggest the directions for documenting local regions of Korea through the application of the strategy. The documentation strategy which was developed more than twenty years ago in mostly western countries gives us some implications for documenting local regions even in current digital environments. They are as follows; Firstly, documentation strategy can enhance the value of archivists as well as archives in local regions because archivist should be active shaper of history rather than passive receiver of archives according to the strategy. It can also be a solution for overcoming poor conditions of local archives management in Korea. Secondly, the strategy can encourage cooperation between collecting institutions including museums, libraries, archives, cultural centers, history institutions, etc. in each local region. In the networked environment the cooperation can be achieved more effectively than in traditional environment where the heavy workload of cooperative institutions is needed. Thirdly, the strategy can facilitate solidarity of various groups in local region. According to the analysis of the strategy projects, it is essential to collect their knowledge, passion, and enthusiasm of related groups to effectively implement the strategy. It can also provide a methodology for minor groups of society to document their memories. This study suggests the directions of documenting local regions in consideration of current archival infrastructure of Korean as follows; Firstly, very selective and intensive documentation should be pursued rather than comprehensive one for documenting local regions. Though it is a very political problem to decide what subject has priority for documentation, interests of local community members as well as professional groups should be considered in the decision-making process seriously. Secondly, it is effective to plan integrated representation of local history in the distributed custody of local archives. It would be desirable to implement archival gateway for integrated search and representation of local archives regardless of the location of archives. Thirdly, it is necessary to try digital documentation using Web 2.0 technologies. Documentation strategy as the methodology of selecting and acquiring archives can not avoid subjectivity and prejudices of appraiser completely. To mitigate the problems, open documentation system should be prepared for reflecting different interests of different groups. Fourth, it is desirable to apply a conspectus model used in cooperative collection management of libraries to document local regions digitally. Conspectus can show existing documentation strength and future documentation intensity for each participating institution. Using this, documentation level of each subject area can be set up cooperatively and effectively in the local regions.

Effects of University Students' Entrepreneurial Passion on Performance through Exploration Capability and Connection Capability (대학생의 기업가 열정이 정보 탐색 및 연계 역량을 통해 창업의지에 미치는 영향에 관한 연구)

  • Yoon, Byeong seon;Kim, Chun Kyu
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.14 no.3
    • /
    • pp.97-110
    • /
    • 2019
  • This study analyzed various factors of influence affecting the will to start a business and established and empirically analyzed a research model to see which factors significantly affect the will to start a business. To this end, we investigated the general characteristics and experiences of individuals, conducted a study on the will to start a business, and analyzed the entrepreneurship passion for startups, the ability to find business opportunities, and the ability to connect with partner companies. The intent to start a business survey was investigated in a recertive style with a 7 point scale, and the reliability and feasibility review were analyzed through the PLS analysis method, which enables the implementation of a measurement model and a structural model. To collect valid data, the survey was conducted using an entrepreneurial curriculum class hours to collect and analyze 421 data. In summary, the results are as follows: First, college students have many opportunities to develop their capabilities through competitions held by universities and support institutions, and by utilizing them, they have no fear of starting a business. Second, the ability of students to discover product clients themselves has been improved by fostering entrepreneurship in the special lectures on startup in universities. Third, it can be seen that it has received various information on startups from support agencies to enhance its commitment to startups. The implications are as follows. First, they should foster entrepreneurship among college students by offering practical oriented courses that can broaden their understanding of startups. Second, it needs to be improved from entrepreneurial enthusiasm to a program that can grow into a company that can collaborate with partner companies and confirm its commitment to corporate establishment and product development and determine market opportunities. Third, it is necessary to establish an ecosystem of start-ups that can carry out systematic planning and performance management as it is weak to carry out projects with will to startups.

Development of the Accident Prediction Model for Enlisted Men through an Integrated Approach to Datamining and Textmining (데이터 마이닝과 텍스트 마이닝의 통합적 접근을 통한 병사 사고예측 모델 개발)

  • Yoon, Seungjin;Kim, Suhwan;Shin, Kyungshik
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.3
    • /
    • pp.1-17
    • /
    • 2015
  • In this paper, we report what we have observed with regards to a prediction model for the military based on enlisted men's internal(cumulative records) and external data(SNS data). This work is significant in the military's efforts to supervise them. In spite of their effort, many commanders have failed to prevent accidents by their subordinates. One of the important duties of officers' work is to take care of their subordinates in prevention unexpected accidents. However, it is hard to prevent accidents so we must attempt to determine a proper method. Our motivation for presenting this paper is to mate it possible to predict accidents using enlisted men's internal and external data. The biggest issue facing the military is the occurrence of accidents by enlisted men related to maladjustment and the relaxation of military discipline. The core method of preventing accidents by soldiers is to identify problems and manage them quickly. Commanders predict accidents by interviewing their soldiers and observing their surroundings. It requires considerable time and effort and results in a significant difference depending on the capabilities of the commanders. In this paper, we seek to predict accidents with objective data which can easily be obtained. Recently, records of enlisted men as well as SNS communication between commanders and soldiers, make it possible to predict and prevent accidents. This paper concerns the application of data mining to identify their interests, predict accidents and make use of internal and external data (SNS). We propose both a topic analysis and decision tree method. The study is conducted in two steps. First, topic analysis is conducted through the SNS of enlisted men. Second, the decision tree method is used to analyze the internal data with the results of the first analysis. The dependent variable for these analysis is the presence of any accidents. In order to analyze their SNS, we require tools such as text mining and topic analysis. We used SAS Enterprise Miner 12.1, which provides a text miner module. Our approach for finding their interests is composed of three main phases; collecting, topic analysis, and converting topic analysis results into points for using independent variables. In the first phase, we collect enlisted men's SNS data by commender's ID. After gathering unstructured SNS data, the topic analysis phase extracts issues from them. For simplicity, 5 topics(vacation, friends, stress, training, and sports) are extracted from 20,000 articles. In the third phase, using these 5 topics, we quantify them as personal points. After quantifying their topic, we include these results in independent variables which are composed of 15 internal data sets. Then, we make two decision trees. The first tree is composed of their internal data only. The second tree is composed of their external data(SNS) as well as their internal data. After that, we compare the results of misclassification from SAS E-miner. The first model's misclassification is 12.1%. On the other hand, second model's misclassification is 7.8%. This method predicts accidents with an accuracy of approximately 92%. The gap of the two models is 4.3%. Finally, we test if the difference between them is meaningful or not, using the McNemar test. The result of test is considered relevant.(p-value : 0.0003) This study has two limitations. First, the results of the experiments cannot be generalized, mainly because the experiment is limited to a small number of enlisted men's data. Additionally, various independent variables used in the decision tree model are used as categorical variables instead of continuous variables. So it suffers a loss of information. In spite of extensive efforts to provide prediction models for the military, commanders' predictions are accurate only when they have sufficient data about their subordinates. Our proposed methodology can provide support to decision-making in the military. This study is expected to contribute to the prevention of accidents in the military based on scientific analysis of enlisted men and proper management of them.

Exposure Assessment for Polycyclic Aromatic Hydrocarbons in the Model Menu System of Korean (한국인의 모델식이에 대한 다환방향족탄화수소류(PAHs)의 인체노출량평가)

  • Kim YunHee;Yoon EunKyung;Lee HyoMin;Park KyungAh;Jun EunAh;Lee CherlHo;Choi SangYun;Lim SeungTaek;Ze KeumRyun;Choi KwangSik
    • Journal of Food Hygiene and Safety
    • /
    • v.19 no.4
    • /
    • pp.176-184
    • /
    • 2004
  • This study was conducted to compare and estimate the daily PAHs dietary intake from both home-cooking and dining-out, through approach of model diet used in exposure assessment of food contaminants. Food commodities reflecting in model diet were selected from the KHIDI report and were analysed in cooked or uncooked edible forms using HPLC-Fluorscence Detector. The PAHs dietary intake comparison between home-cooking and dining-out was based on one meal intake suggested in model diet and PAHs dietary intake was estimated by using food consumption rate and body weight of the Korean adult group. The daily PAHs dietary intake was calculated by permutation and combination method with assumption that a person consumed 2 meals from home-cooking menu and 1 meal from dining-out menu. The total PAHs levels in 36 food commodities with 200 samples were ranged from 2.00 ug/kg to 141.28 ug/kg and a food showing the highest PAHs level was the stir-fried anchovy. The $TEQ_{BaP}$ levels of PAHs were calculated using benzo(a)pyrene equivalents individual congener level and corresponding TEF value and the $TEQ_{BaP}$ level were ranged from $0.03\;ugTEQ{BaP}$ to $1.31\;ugTEQ_{BaP}$ and a food showing the highest $TEQ_{BaP}$ level was the hamburger. The PAHs dietary intakes per one meal from home-cooking and dining-out were $2.4\times10^{-3}\;ugTEQ_{BaP}/kg/meal\;and\;4.0\times10^{-3}\;ugTEQ_{BaP}/kg/meal$, respectively. This data showed the PAHs dietary intake from dining-out was about 1.7 times higher than from the home-cooking. The daily PAHs dietary intakes of general Korean adult having two meals from home-cooking and one meal from dining-out per a day were ranged between $8.0\times10^{-3}\~9.7\times10^{-3}\;ugTEQ_{BaP}/gg/day$ and mean value as $8.9\times10^{-3}\~9.7\times10^{-3}\;ugTEQ_{BaP}/gg/day$.