Component-based software engineering (CBSE) composes reusable components and develops applications with the components. CBSE is admitted to be a new paradigm that reduces the costs and times to develop software systems. The high quality of component designs can be assured if the consistency and correctness among the elements of a component are verified with formal specifications. Current formal languages for components include only some parts of contracts between interfaces, structural aspects and behavioral aspects of component, component-based system, component composition and variability. Therefore, it is not adequate to use current formal languages in all steps of a component design process. In this paper, we suggest a formal language to specify component designs Component-Z. Component-Z extends Object-Z, adds new notations to specify components. It can be possible to specify interfaces, the inner structure of a component, inner workflows, and workflows among interfaces with Component-Z. In addition, Component-Z provides the notations and semantics to specify variability with variation points, variants and required interfaces. The relation between interfaces and components is defined with mapping schemas. Parallel operator is used to specify component composition. It can be possible to describe deployed components with the specifications of component-based systems. Therefore, the formal specification language proposed in this paper can represent all elements to design components. In the case study, we specify an account management system in a bank so that we show that Component-Z can be used in all steps of component design.
The purpose of this study is to demonstrate the effects of job training program satisfaction on objective training performance such as employment rate. In addition, the NCS(National Competency Standards) level was considered as a moderating variable in order to clarify the boundary conditions between job training program satisfaction and employment rate. The data used for the analysis of the research model are 513 job training programs that provide employment rate information among job training programs of 2016 Gwangju area on HRD-Net. The results of the analysis are summarized as follows. First, The satisfaction score of the job training programs calculated on the basis of the six dimensions of satisfaction is 4.46. The NCS level of the job training programs ranged from 2 to 6. The average score of the programs was 3.32. Second, satisfaction with the job training programs has no statistically significant effect on the employment rate, but the NCS level of the job training programs was found to be statistically significant in the interaction effect. Finally, policy implications, limitations, and further research directions are mentioned through this study.
Recently, thank to the popularization of light-weight drone through the significant developments in computer technologies as well as the advanced automated procedures in photogrammetry, Unmanned Aircraft Systems have led to a growing interest in industry as a whole. Documentation, maintenance, and restoration projects of large scaled cultural property would required accurate 3D phenomenon modeling and efficient visual inspection methods. The object of this study verify on the accuracies achieved of 3D phenomenon reconstruction as well as on the validity of the preservation, maintenance and restoration of large scaled cultural property by UAS photogrammetry. The test object is cltural heritage(treasure 1324) that is the rock-carved standing Bodhisattva in Soraesan Mountain, Siheung, documented in Goryeo Period(918-1392). This standing Bodhisattva has of particular interests since it's size is largest stone Buddha carved in a rock wall and is wearing a lotus shaped crown that is decorated with arabesque patterns. The positioning accuracy of UAS photogrammetry were compared with non-target total station survey results on the check points after creating 3D phenomenal models in real world coordinates system from photos, and also the quantified informations documented by Culture Heritage Administration were compared with UAS on the bodhisattva image of thin lines. Especially, tests the validity of UAS photogrammetry as a alternative method of visual inspection methods. In particular, we examined the effectiveness of the two techniques as well as the relative fluctuation of rock surface for about 2 years through superposition analysis of 3D points cloud models produced by both UAS image analysis and ground laser scanning techniques. Comparison studies and experimental results prove the accuracy and efficient of UAS photogrammetry in 3D phenomenon modeling, maintenance and restoration for various large-sized Cultural Heritage.
Journal of the Korea Institute of Information Security & Cryptology
/
v.22
no.4
/
pp.851-868
/
2012
After the financial crisis in 2008, the financial market still seems to be unstable with expanding the insolvency of the financial companies' real estate project financing loan in the aftermath of the lasted real estate recession. Especially after the illegal actions of people's financial institutions disclosed, while increased the anxiety of economic subjects about financial markets and weighted in the confusion of financial markets, the potential risk for the overall national economy is increasing. Thus as economic recession prolongs, the people's financial institutions having a weak profit structure and financing ability commit illegal acts in a variety of ways in order to conceal insolvent assets. Especially it is hard to find the loans of shareholder and the same borrower sharing credit risk in advance because most of them usually use a third-party's name bank account. Therefore, in order to effectively detect the fraud under other's name, it is necessary to analyze by clustering the borrowers high-related to a particular borrower through an analysis of association between the whole borrowers. In this paper, we introduce Analysis Techniques for detecting financial loan frauds in advance through an analysis of association between the whole borrowers by extending SNA(social network analysis) which is being studied by focused on sociology recently to the forensic accounting field of the financial frauds. Also this technique introduced in this pager will be very useful to regulatory authorities or law enforcement agencies at the field inspection or investigation.
Journal of the Korea Society of Computer and Information
/
v.28
no.11
/
pp.113-123
/
2023
This paper introduces the Cherry system, a user-independent blockchain donation system. This is a procedure that is delivered to the beneficiary's bank account through a virtual account when a donor makes a donation, so there is no difference from the existing donation delivery method from the user's point of view However, within the blockchain, Cherry Points, a virtual currency based on the user ID, are issued and delivered to the beneficiary, while all transactions and the beneficiary's usage history are managed on the blockchain. By adopting this method, there was an improvement in blockchain performance, with transaction processing exceeding 1,000 TPS in typical transaction condition and service completion within 21.3 seconds. By applying the automatic influence control algorithm to this system, the influence according to stake, which is an individual donation, is greatly reduced to 0.3 after 2 months, thereby concentrating influence could be controlled automatically. In addition, it was designed to enable micro tracking by adding a tracking function by timestamp to the donation ledger for each individual ID, which greatly improved the transparency in the use of donations. From a service perspective, existing blockchain donation systems were handled as limited donation delivery methods. Since it is a direct service in a user-independent method, convenience has been greatly improved by delivering donations in various forms.
As the transaction volume of the C2C second-hand market is growing, the number of frauds, which intend to earn unfair gains by sending products different from specified ones or not sending them to buyers, is also increasing. This study explores the model that can identify frauds in the online C2C second-hand market by examining the postings for transactions. For this goal, this study collected 145,536 field data from actual C2C second-hand market. Then, the model is built with the characteristics from postings such as the topic and the linguistic characteristics of the product description, and the characteristics of products, postings, sellers, and transactions. The constructed model is then trained by the machine learning algorithm XGBoost. The final analysis results show that fraudulent postings have less information, which is also less specific, fewer nouns and images, a higher ratio of the number and white space, and a shorter length than genuine postings do. Also, while the genuine postings are focused on the product information for nouns, delivery information for verbs, and actions for adjectives, the fraudulent postings did not show those characteristics. This study shows that the various features can be extracted from postings written in C2C second-hand transactions and be used to construct an effective model for frauds. The proposed model can be also considered and applied for the other C2C platforms. Overall, the model proposed in this study can be expected to have positive effects on suppressing and preventing fraudulent behavior in online C2C markets.
This paper analyzes the changes in financial reform during the Kim Jong-un era based on North Korean literature. We find that North Korea has systematically and functionally separated the central bank from commercial banks since the Kim Jong-un era began. In addition, enterprises have been allowed to withdraw cash from bank accounts and make inter-enterprise cash payments. In other words, nowadays non-cash currencies with passive money can partially serve as active money with purchasing power. With the systematic and functional separation of the central bank and the commercial bank, the issuance of the central bank changed to a money supply method through the commercial bank, and changes in the currency distribution structure have allowed commercial bank's credit creation function to be implemented. This means that the banking system and the monetary·payment system of the socialist planned economy are changing in the way of the market economy. Reforms in the financial sector are believed to have been necessary to support changes in the economic system and to restore the function of the public financial sector. These changes have progressed in terms of the level of reform, but they are still considered similar to the period of the former Soviet Union's Perestroika or to the early period of China's reform and opening. Although North Korea's financial reform is superior in terms of enacting the banking law, it is insufficient in terms of realizing the functions of commercial banks. In addition, it is assessed that institutional constraints such as maintaining a planned economy, and the lack of confidence in public finances limit the effectiveness and development of the financial system. It should be noted that these results are based on literature published in North Korea. In other words, there is a limit in the fact that such recent changes have been carried out on a trial basis in some areas, or have been carried out in a full-scale manner with a blueprint, since Kim Jong-un's inauguration.
The digital transformation of finance is accelerating, and digital banking has already become a major banking channel. Banks have traditionally placed importance on CRM(Customer Relationship Management) and have tried to retain their loyal customers, who contribute significantly to the bank, such as long-term transactions, holding accounts with a certain balance or more, and holding loans. In this situation, this study exploratorily analyzed the consumer behavior of digital banking deposits in a major bank of Korea(1,145 samples). Statistical analysis was performed using SPSS. The main findings of the study are summarized as follows. It was found that there were differences of consumer behavior in digital banking deposits by generation, and the MZ generation used digital banking more on holidays than other generations. As a result of analyzing the behavior of existing loyal customers and regular customers of digital banking deposit, there was a significant difference in both the amount and period of the deposit. It was confirmed that the existing loyal customers of the bank also engage in consumer behavior that contributes to the bank in digital banking. In addition, the interaction between the customer type and the date of sign up for the deposit period, which is the goal setting of financial consumers, it was found that there was a significant effect. This study empirically analyzed the consumer behavior of digital banking in a situation where decrease of bank branches and encounters with digital banking. The major concepts of the consumer behavior theory are Loyal Customer, Goal Pursuit, and Habit, which were confirmed in an example of digital banking. The results of this study can suggest practical implications for existing banks and Internet-only banks, including the importance of customer management in digital banking.
This study analyzed Woori Investment and Securities' industry-leading marketing from both a brand management and a marketing decision-making perspective. By executing a different marketing strategy from its competitors, Woori Investment and Securities recognized recent changes in the asset management and investment markets as an open opportunity, and quickly responded to the market changes. First, the company launched the octo brand as a multi-account product, two years before its competitors offered their own products. In particular, it created a differentiated brand image, using the blue octopus character, which became familiar to the general financial community, and was consistently employed as part of an integrated marketing communications strategy. Second, it executed a brand expansion strategy by sub-branding octo in a variety of new financial products, responding to rapid changes in the domestic financial and asset management markets. Through this strategic evolution, the octo brand became a successful wealth management brand and representative of Woori Investment & Securities. Third, it has converged market research, demand and trend analysis, and customer needs acquired through various customer contact channels into a marketing perspective. Thus, marketing has participated in the product development stage, a rarity in the finance industry. Woori Investment and Securities has a leading marketing system. The heart of the successful product creation lies in a collaboration of their customer bases among the finance companies in the Woori Financial Group. The present study suggested a corresponding strategy for octo brand, which is expected to enter into the maturity stage of its product life cycle. In addition, this study found a need to modify the current positioning strategy in order to position and preserve sustainability in the increasingly competitive asset management market. It also suggested the need for an offensive strategy to counter the number one M/S company, and address the issue of cannibalism in the Woori Financial Group.
Asia-Pacific Journal of Business Venturing and Entrepreneurship
/
v.19
no.4
/
pp.127-139
/
2024
This study investigates the impact of edutech characteristics and both tangible and intangible educational services on the intention to re-enroll, which is directly related to the management performance of private institutes. The study aims to propose strategies to improve re-enrollment intentions and management performance based on the findings. Private education has grown continuously, complementing the limitations of public education and increasing parental dependence. This study tested the hypothesis that edutech characteristics, intangible services, and tangible services, increasingly utilized with the development of information and communication technology, would influence re-enrollment intentions. It also examined whether rapport-building behavior with parents would have a moderating effect on this relationship. The hypothesis testing results showed that among the edutech characteristics, content, intangible services such as reliability and empathy, and tangible services such as tangibility and payment accessibility positively impacted re-enrollment intentions. The hypothesis that rapport-building behavior would moderate the relationship between educational services and re-enrollment intentions was supported for empathy in intangible services and tangibility in tangible services. Based on these findings, the study proposed three strategies to improve management performance of private institutes. First, in terms of improving and managing edutech characteristics, it suggested introducing and updating edutech content and ensuring operational stability. Second, for improving and managing intangible services, it recommended managing instructor recruitment and training to enhance quality and competence, maintaining professionalism through continuous education by credible institutions, and providing level-based education for students based on the qualitative improvement of educational programs. Third, to improve and manage tangible services, it suggested setting appropriate tuition fees, offering various payment methods (online, mobile, card, bank transfer) unrestricted by time and place, and equipping interiors and facilities that enable focused learning. Additionally, considering the moderating effect of rapport-building behavior, it emphasized that improvements and management requiring costs are necessary, but making parents feel a high level of tangibility through rapport-building is also important. Furthermore, given the increasing importance of edutech based on information and communication technology, the study highlighted the need for various support measures such as government technological support and venture certification system support for institutes with an entrepreneurial spirit aiming to introduce innovative technologies such as AI technology based on large language models and AR/VR-applied metaverse environments. This study is expected to help improve the management performance of private institutes by specifically suggesting items and methods for improvement and management in the educational field.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.