• Title/Summary/Keyword: 경제문제

Search Result 4,478, Processing Time 0.034 seconds

Control Networks for Information Systems Development : Organizational and Agency Theory Perspectives (조직 이론과 대리 이론 관점에서 본 정보시스템 개발의 통제 네트워크에 관한 연구)

  • Hong, Sa-Neung
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.71-90
    • /
    • 2012
  • Although it has been studied for a long time in various disciplines, most of control theories remain being developed by analyzing relatively simple tasks. Even recent research on control of information systems development explains only a small part of control phenomena observed in the real world projects. This research focuses on identifying and analyzing the concepts and structures in order to make them useful for understanding and explaining control of information systems development comprehensively This investigation utilizes the complementary relationship between views on control from organizational and economic perspectives. A conceptual framework developed by integrating previous research on control allows us to analyze the development of information systems for control purposes. The results of discussion about control mechanisms and network can be used as guidelines for designing control systems in real projects. Analysis of control networks shows that control of development projects requires quite complex networks intertwining a variety of controllers and controlees. The results of this research are expected to contribute to correcting the unbalanced status of IS research which has emphasized too heavily on planning and implementation, and deepening and widening our understanding about controlling development projects. Practitioners can use the results as guidelines for designing control mechanisms and networks, and get alerted by them about the agency risks inherent in outsourced developments.

Influence of Nursing Satisfaction, Self-Esteem and Depression on Adjustment of the Elderly in Long-term Care Hospital (요양병원 입원노인의 간호만족도, 자아존중감 및 우울이 적응에 미치는 영향)

  • Lee, Kyoung-Mi;Jo, Eun-Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.441-451
    • /
    • 2016
  • This study was conducted to determine the influence of satisfaction, self-esteem, and depression on adjustment of elderly patients in long-term care hospitals. The subjects were 116 elderly patients in 15 long-term care hospitals in B and K city. Data were collected from February 14 to March 30, 2015, and analyzed by t-rest, ANOVA, Scheff's test, Pearson correlation coefficients, and stepwise multiple regression. According to the results, there were significant differences in adjustment by religion, marital status, economic status, and perceived level of difficult problems. Adjustment was positively related to satisfaction and self-esteem. In addition, a negative correlation was observed between adjustment and depression. Meaningful variables that influenced the adjustment of elderly patients were depression, satisfaction, self-esteem, and religion. These factors accounted for 53.5% of the total variance in adjustment of the elderly patients in long-term care hospitals, and depression was the most influential factor. In conclusion, development and implementation of effective programs and strategies to reduce depression and to increase satisfaction with care and self-esteem is needed in order to enhance the adjustment of elderly patients in long-term care hospitals.

An Impact Assessment Index for the RFID Privacy (RFID 개인정보 영향평가지수 개발)

  • Han, Pil-Koo;Kang, Byung-Goo
    • Journal of Information Management
    • /
    • v.40 no.1
    • /
    • pp.69-86
    • /
    • 2009
  • The biggest paradigm of the latest telecommunications is ubiquitous computing. It is a technology basis to realize ubiquitous society that would affect social, economical and cultural industries with positive influence. However, there is a simultaneous concern that the approach to ubiquitous society may violate one's privacy. Therefore, the existence of legal and technological regulation would be the biggest obstacle in further RFID technology and industry dissemination. Also, in business side, they must invest with enormous expense and technology if technological method is only approached for the solution. As in the research, 8 RFID applications, application process and inspection items and 85 appraisal list of "An impact assessment for the privacy protection in RFID applications" developed by P. K. Han(2006), will be used as an indicator to measure RFID privacy impact assessment. In addition, it is to develop RFID privacy impact assessment index by applying objective data with survey of applied specialists. This would provide a data with feasibility and reliability to RFID related companies and able to utilize policy making on RFID private data. In addition, it is expected to contribute as an efficiency tool for individual data to build basis of ubiquitous society.

Improvement of Performance for Online Certificate Status Validation (실시간 인증서 상태검증의 성능개선)

  • Jung, Jai-Dong;Oh, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.433-440
    • /
    • 2003
  • According as the real economic activities are carried out in the cyber world and the identity problem of a trade counterpart emerges, digital signature has been diffused. Due to the weakness for real-time validation using the validation method of digital signature, Certificate Revocation List, On-line Certificate Status Protocol was introduced. In this case, every transaction workload requested to verify digital signature is concentrated of a validation server node. Currently this method has been utilized on domestic financial transactions, but sooner or later the limitation will be revealed. In this paper, the validation method will be introduced which not only it can guarantee real-time validation but also the requesting node of certificate validation can maintain real-time certificate status information. This method makes the revocation management node update the certificate status information in real-time to the validation node while revoking certificate. The characteristic of this method is that the revocation management node should memorize the validation nodes which a certificate holder uses. If a certificate holder connects a validation node for the first time, the validation node should request its certificate status information to the above revocation management node and the revocation management node memorizes the validation node at the time. After that, the revocation management node inform the revocation information in real-time to all the validation node registered when a request of revocation happens. The benefits of this method are the fact that we can reduce the validation time because the certificate validation can be completed at the validation node and that we can avoid the concentration of requesting certificate status information to a revocation node.

Performance Improvement of Spam Filtering Using User Actions (사용자 행동을 이용한 쓰레기편지 여과의 성능 개선)

  • Kim Jae-Hoon;Kim Kang-Min
    • The KIPS Transactions:PartB
    • /
    • v.13B no.2 s.105
    • /
    • pp.163-170
    • /
    • 2006
  • With rapidly developing Internet applications, an e-mail has been considered as one of the most popular methods for exchanging information. The e-mail, however, has a serious problem that users ran receive a lot of unwanted e-mails, what we called, spam mails, which cause big problems economically as well as socially. In order to block and filter out the spam mails, many researchers and companies have performed many sorts of research on spam filtering. In general, users of e-mail have different criteria on deciding if an e-mail is spam or not. Furthermore, in e-mail client systems, users do different actions according to a spam mail or not. In this paper, we propose a mail filtering system using such user actions. The proposed system consists of two steps: One is an action inference step to draw user actions from an e-mail and the other is a mail classification step to decide if the e-mail is spam or not. All the two steps use incremental learning, of which an algorithm is IB2 of TiMBL. To evaluate the proposed system, we collect 12,000 mails of 12 persons. The accuracy is $81{\sim}93%$ according to each person. The proposed system outperforms, at about 14% on the average, a system that does not use any information about user actions.

A Study on the Development of Non-PC High-Early-Strength Concrete Without Steam Curing (증기양생이 불필요한 PC부재용 조강형 콘크리트 개발에 관한 연구)

  • Jun, Woo-Chul;Lee, Ji-Hwan;Park, Hee-Gon;Lee, Jae-Sam;Kim, Kyung-Min;Cho, In-Sung
    • Journal of the Korea Institute of Building Construction
    • /
    • v.14 no.2
    • /
    • pp.156-162
    • /
    • 2014
  • This study aims to develop a rapidly hardening type of concrete to achieve the removal of form intensity (more than 10MPa) using the method of curing at room temperature in order to solve some economic environmental problems by omitting the steam curing process involved in producing PC (Precast Concrete). Therefore, this study evaluated a rapidly hardening cement containing a high amunt of C3S, which is very responsive in expressing early intensity, and a rapidly hardening type of concrete which uses some hardening accelerator to increase thehydration reaction of $C_3S$. The results of the experiment on concrete using some hardening accelerator are asfollows. In the slump flow experiment for identifying the liquidity and the air test, the desired values were met. The compression strength showed rapid expression response by 12 hours, and met the desired value within 6~9 hours. Its drying shrinkage value and Autogenous shrinkage value were measured as below ($-754.5{\times}10^{-6}$),and satisfied the requirements. In addition, in the Semi-Adiabatic Temperature Test, it was found that the concrete rose to its peak temperature within 24 hours and then its temperature dropped.

A Study of the Weight value to Risky Driving Type (위험운전유형에 따른 가중치 산정에 관한 연구)

  • Oh, Ju-Taek;Lee, Sang-Yong
    • International Journal of Highway Engineering
    • /
    • v.11 no.1
    • /
    • pp.105-115
    • /
    • 2009
  • According to the accident statistics published by the National Police Agency in 2007, the number of commercial vehicle(city, suburb and other buses) accidents consumes 3.5 percent of the total number of traffic accidents in this year. Since the commercial vehicles are responsible for not only the drivers but also the passengers, it leads more serious social and economic problems. There have been various forms of systems such as a digital speedometer or a black box to meet the social requirement for reducing traffic accidents and safe driving. however the system based on the data after accident control the driver by analyze dangerous drive behaviors, so there is a limit to control driver in real-time. Also speedometer currently managed provide the driver warning information in real-time, but using only the speed of vehicle and RPM information regardless of actual dangerous drive behaviors, disappear the effectiveness. In this study performed a simulation for drivers in general using a simulator programed with dangerous driving types we had developed in the previous study and judging the types. It'd be more effective system to provide the drivers warning information using weight valued in this study. However in this study is limited to apply weight as a result of simulation of drivers in general in actual situation should be made up the deficit based on information of driving type of actual commercial vehicles.

  • PDF

An Exploratory Study on the Risks and Threats of SNS(Social Network Service): From a Policing Perspective (SNS(Social Network Service)의 위험성 및 Policing(경찰활동)에 미칠 영향에 대한 시론적 연구)

  • Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.301-336
    • /
    • 2011
  • This exploratory study aims to review the risks and threats of social network services(SNSs), particularly focusing upon the policing perspective. This paper seeks to acknowledge the present risk/danger of SNSs and the very significance of establishing a strategic framework to effectively prevent and/or control criminal misuse of SNSs. This research thus advocates that proactive study on security issues and criminal aspects of SNSs and preventive countermeasures can play a significant role in policing the networked society in the time of digital/internet age. Social network sites have been increasingly attracting the attention of entrepreneurs, and academic researchers as well. In this exploratory article, the researcher tried to define concepts and features of SNSs and describe a variety of issues and threats posed by SNSs. After summarizing existing security risks, the researcher also investigated both the potential threats to privacy associated with SNSs, such as ID theft and fraud, and the very danger of SNSs in case of being utilized by terrorists and/or criminals, including cyber-criminals. In this study, the researcher primarily used literature reviews and empirical methods. The researcher thus conducted extensive case studies and literature reviews on SNSs. The literature reviews herein cover theoretical discussions on characteristics, usefulness, and/or potential danger/harm of SNSs. Through the literature review, the researcher also concentrated upon being able to identify a strategic framework for law enforcement to effectively prevent criminal misuse of SNSs The limitation of this study can be lack of statistical data and attempts to examine previously un-researched area in the field of SNS and its security risks and potential criminal misuse. Thus, to supplement this exploratory study, more objective theoretical models and/or statistical approaches would be needed to provide law enforcement with sustainable policing framework and contribute to suggesting policy implications.

  • PDF

Establishment of Korea National Counter-terrorism System and Development Plan (국가대테러체제의 구축 및 발전방안)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.229-249
    • /
    • 2015
  • As the post-cold war era and globalization go on, national security problems which were not traditional national security problems such as terrorism, crime, environmental disasters, economic crises, cyber-terrorism, diseases, and energy problems threat humanity and nations and demands changes. Also, with the change, the concept of "big government" has emerged as the role of nation expanded. The modern society sees every country change from small government to big government in order to realize the establishment of welfare state. A comprehensive interpretation of security is needed in order to comprehensive protection of citizens beyond outside invasion such as crime, new disaster, terrorism. In Korea, incidents such as Cheonan-Ham, Yeonpeyong-Do, foot-and-mouth disease, Ddos terrorism, pirates hostages, mad cow disease, AI are happening and the humanitarian support for North Korea and the summit of South and North Korea are at a standstill. Also, National emergency management system, comprehensive emergency management center, countrol tower, national security system, cooperation with citizens, establishment of legal and institutional system are needed. The importance of this research is on the reestablishment of new national security and emergency management system according to the comparison between the national security and counter-terrorism system of Korea and that of the United States which is a leading country in this field. Also, the establishment of national emergency management act is needed as a statute for effective function as currently various laws and administrative organizations are dispersed.

  • PDF

Study on the police's protection·support of victims-declaring the Victims Protection years (피해자보호원년을 선언한 경찰의 범죄피해자 보호·지원에 관한 연구)

  • Gong, Jung-Sik
    • Korean Security Journal
    • /
    • no.45
    • /
    • pp.7-35
    • /
    • 2015
  • South Korea's socioeconomic status is high enough to support services for the protection of crime victims. Until now, the Ministry of Justice was the only institution to protect and support the victims, but recently the national police is included. This is considered preferable, since the police is the one to contact the victims first- they can provide immediate support after the incident. Several limits in current laws and crime protection system exist. Therefore, given the importance of protecting victims, model of public-private joint forms should be considered. In premise of establishing a new relationship between the public-private joint system of justice and the maintenance, the range of police's involvement with crime supports will be determined. In the case of developed countries, the police and private organizations maintain close cooperation, appearing as substantial care and support for crime victims. Therefore this study reviews the problems in crime victim protection, assistance from the police stage, and suggest the improvements as follows. The first is to redefine the role of the police who first contacted in the crime victims protection support, the second is to establish a permanent cooperation framework, such as victims specialized police, victims protection agency, the third is to develop services for victim protection available from the police stage, and the fourth, opening Victim Support Center functioning as a temporary accommodation or safety zone for the personal protection of victims. The fifth is to regularize solution conference for victims' protection, and the sixth is to divide of roles in state organization government in charge of victim's protection and local government responsible for victim's support.

  • PDF