• Title/Summary/Keyword: 공개여부

Search Result 145, Processing Time 0.026 seconds

초기 투자성과와 연계된 창업기업의 내부 결정요인 분석

  • Gu, In-Hyeok;Kim, Yong-Deok;Jo, Jae-Min
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2022.11a
    • /
    • pp.195-199
    • /
    • 2022
  • 본 연구는 스타트업 투자성과와 연계된 창업가 역량, 재무정보 등 정량데이터를 기반으로 스타트업 투자자들의 투자결정요인을 분석하였다. 주요 실증결과는 다음과 같다. 첫째, 창업 초기 종업원 수가 많고, 최고경영자의 지분비율이 높을수록 투자승인 확률이 높게 나타났다. 둘째, 재무적 특성에서는 기업의 매출액 규모가 작을수록 투자승인 확률이 높게 나타났다. 이러한 결과는 스타트업의 경우, 기업의 단기성과보다는 투자 결정에 있어 미래가치 혹은 다른 정성적인 요인이 더 고려된다는 점을 보여준다. 셋째, 창업가 특성에서는 CEO 교육수준(학력)이 높을수록 투자승인 확률이 높게 나타났다. 즉, 창업자의 학력은 성공적인 투자 여부에 핵심적인 변수이고 이것은 선행연구의 결과와 다르지 않았다. 또한, 학력과 투자유치의 연관성은 창업 3년 미만 스타트업에서 상대적으로 강하게 나타났다. 선행연구에서 투자정보공개, 관련 데이터 확보의 어려움으로 스타트업 투자에 관한 정량적 실증연구가 거의 진행되지 못한 점을 고려한다면, 본 연구는 설문조사 방식을 뛰어넘어 국내 초기 창업기업만을 대상으로 성공적인 투자유치와 연계된 스타트업의 평가요인을 정량적으로 분석했다는 점에서 중요한 의의를 갖는다.

  • PDF

Research on Normalizing Flow-Based Time Series Anomaly Detection System (정규화 흐름 기반 시계열 이상 탐지 시스템 연구)

  • Younghoon Jeon;Jeonghwan Gwak
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.283-285
    • /
    • 2023
  • 이상 탐지는 데이터에서 일반적인 범주에서 크게 벗어나는 인스턴스 또는 패턴을 식별하는 중요한 작업이다. 본 연구에서는 시계열 데이터의 특징 추출을 위한 비지도 학습 기반 방법과 정규화 흐름의 결합을 통한 이상 탐지 프레임워크를 제안한다. 특징 추출기는 1차원 합성곱 신경망 기반의 오토인코더로 구성되며, 정상적인 시퀀스로만 구성된 훈련 데이터를 압축하고 복원하는 과정을 통해 최적화된다. 추출된 시계열 데이터의 특징 맵은 가능도를 최대화하도록 훈련된 정규화 흐름의 입력으로 사용된다. 이와 같은 방식으로 훈련된 이상 탐지 시스템은 테스트 샘플에 대한 이상치를 계산하며, 최종적으로 임계값과의 비교를 통해 이상 여부를 예측한다. 성능 평가를 위해 시계열 이상 탐지를 위한 공개 데이터셋을 이용하여 공정하게 이상 탐지 성능을 비교하였으며, 실험 결과는 제안하는 정규화 흐름 기법이 시계열 이상 탐지 시스템에 활용될수 있는 잠재성을 시사한다.

  • PDF

The Efficient Multipurpose Convertible Undeniable Signature Scheme (효율적인 다목적 전환 부인봉쇄 서명 기법)

  • Han Kun-Hee;Yun Sung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.3
    • /
    • pp.83-91
    • /
    • 2005
  • The digital signature can be verified and disavowed only with cooperation of the signer in 'undeniable signature scheme. A signed confidential document of a company can be copied and delivered to a rival company. If a conventional signature scheme is used to sign the document, it can be confirmed as authentic by verifying the signature without the signer's cooperation. However, if the company doesn't want the document to be verified as authentic by the rival company, it is recommended to use the undeniable signature scheme. Convertible undeniable signature scheme has additional property that the signer can convert undeniable signature to the ordinary one. The document signed by undeniable signature scheme that is no longer confidential can be opened to public use by converting the signature to the ordinary one. In this study, the efficient multipurpose convertible undeniable signature scheme based on El-Gamal signature scheme is proposed. The proposed scheme satisfies undeniable property and can convert undeniable signature to the ordinary one. The number of public keys and signatures are less than those of Boyar's convertible signature scheme. It also reduces the number of communication steps of the signature confirmation protocol.

  • PDF

Factors Affecting the School Achievement of Domestic Adopted Children in Korea (국내 입양아동의 학업성취수준과 영향 요인)

  • Ahn, Jae-Jin;Choi, Woon-Sun;Byun, Mi-Hee;Kwon, Ji-Sung
    • Korean Journal of Social Welfare
    • /
    • v.69 no.3
    • /
    • pp.141-164
    • /
    • 2017
  • The purpose of this study is to understand the school achievement of domestic adopted children in Korea and its related factors. Although the developmental outcomes of domestic adopted children were the focus of research interests, their school achievement has never been fully addressed in Korea. The subsample (9-17 years old) of 5th wave data of was used for the analysis. The results showed that the school achievement level of domestic adopted children was not significantly different from their non-adopted peers during elementary school years except the mathematics, but changed drastically after they entered the middle school, showing significantly lower level from their non-adopted peers. Factors related with the overall school achievement were the level of school, maternal education, age at adoption, child's self-esteem and school adjustment. For specific subject, however, significant factors were found to be somewhat different. Based on the results of the study, the practical guidelines to improve the school achievement of adopted children were suggested. Also, suggestions for the following studies were made.

  • PDF

A Study on the Redesign Method of Presidential Record Management through Presidential Record Analysis (대통령기록 분석을 통한 대통령기록관리 재설계 방안 연구)

  • Inho Yang
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.23 no.3
    • /
    • pp.89-113
    • /
    • 2023
  • This study investigates and analyzes the 16th Presidential records (record management secretary's office) from a record-recognition perspective and, based on the results, suggests the Presidential record management plan. To this end, the function of the records management secretary's office was first analyzed, and the 16th Presidential records transferred to the Presidential Archives were reviewed from a general perspective. Next, the nature of the records was investigated in a deductive, top-down manner by quantitatively analyzing the "production system type," "preservation period," "reason for determining the retention period," "management department," "electronic record type," "production year," etc., focusing on the "records file/item," "unit task," and "function." Finally, the characteristics and problems revealed during the record analysis were summarized. Based on the analysis results, a plan was proposed to redesign Presidential record management for the "reorganization" and "service" parts of the records.

A Study on the Comparison of Similarity between Master Manuals of Appraisal Program (감정대상 프로그램의 마스터 매뉴얼 유사성 비교에 관한 연구)

  • Chun, Byung-Tae;Lee, Chang-Hoon
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 2019
  • Program similarity analysis consists of substantial similarity and access. Substantial similarity is a judgment of how similarly the program source code is quantitatively. Access determines the degree of similarity by analyzing comments in the program or other contextual evidence. In the case of manuals, it may be the subject of legitimacy analysis. Manuals can be divided into three types as follows. First, a master manual is a document created during the development stage of a product. It is a user manual that contains all the functionality of the product and its derivatives. Second, the customer manual is a manual that is open only to the primary customer and orderer. Third, the user manual is a document that is applied to the final OEM production stage and is open to the end purchaser. In this paper, we compare the master manual seized from the suspect and the master manual provided by the suspect on the Internet. It then determines how similar this master manual is and includes the victim company's original and property values.

Static Identification of Firmware Linux Kernel Version by using Symbol Table (심볼 테이블을 이용한 펌웨어 리눅스 커널 버전 정적 식별 기법)

  • Kim, Kwang-jun;Cho, Yeo-jeong;Kim, Yun-jeong;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.67-75
    • /
    • 2022
  • When acquiring a product having an OS, it is very important to identify the exact kernel version of the OS. This is because the product's administrator needs to keep checking whether a new vulnerability is found in the kernel version. Also, if there is an acquisition requirement for exclusion or inclusion of a specific kernel version, the kernel identification becomes critical to the acquisition decision. In the case of the Linux kernel used in various equipment, sometimes it becomes difficult to pinpoint the device's exact version. The reason is that many manufacturers often modify the kernel to produce their own firmware optimized for their device. Furthermore, if a kernel patch is applied to the modified kernel, it will be very different from its base kernel. Therefore, it is hard to identify the Linux kernel accurately by simple methods such as a specific file existence test. In this paper, we propose a static method to classify a specific kernel version by analyzing function names stored in the symbol table. In an experiment with 100 Linux devices, we correctly identified the Linux kernel version with 99% accuracy.

A Study on the Possibility of Open Access to International Journal Articles: based on Articles cited in the Journal of the Korean Society for Information Management (해외 학술지 논문의 OA 접근가능성에 관한 연구: 정보관리학회지에 인용된 논문을 중심으로)

  • Kim, Gyuhwan
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.4
    • /
    • pp.207-223
    • /
    • 2020
  • This study aims to review the possibility of OA to international journal articles cited by researchers of the library and information science field in Korea. For this, the international journal articless cited to the articles (1,543) of the Korean Society for Information Management were collected, and the investigation was carried out regarding the OA policy of the international journals and the status of journals that can be open to the public through the OA according to the OA policy. In addition, this study analyzed the actual accessibility by utilizing the OA finders (Google Scholar, Unpaywall, OA Button). The analysis result indicated that the majority of the international journals were using the green OA policy. Also, 1,476 journal articles which is 95.4% of the total international journal articles were allowed to be accessed officially with the OA. The results of reviewing the actual accessibility rate of the journal articles open to the public through the use of the OA finders indicated that accessibility was up to 68% when using Google Scholar, and the maximum accessibility rate was 72% when mixing the OA finders. Among the OA finders, Google Scholar had the greatest OA accessibility rate, but it was desirable to mix the OA finders in order to expand the OA accessibility rate to the maximum level.

Data Anonymity Decision (데이터 익명화 결정 기법)

  • Jung, Min-Kyoung;Hong, Dong-Kweon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.2
    • /
    • pp.173-180
    • /
    • 2010
  • The research of the preserving privacy of sensitive information has been popular recently. Many researches about the techniques of generalizing records under k-anonymity rules have been done. Considering that data anonymity requires a lot of time and resources, it would be important to decide whether a table is vulnerable to privacy attacks before being opened in terms of the improvement of data utilization as well as the privacy protection. It is also important to check to which attack the table is vulnerable and which of anonymity methods should be applied in the table. This paper describe two possible privacy attacks based upon related references. Also, we suggest the technique to check whether data table is vulnerable to any attack of them and describe what kind of anonymity methods should be done in the table. The technique we suggest in this paper can also be applied for checking the safety of anonymity tables in which insert or delete operations occurred as well from privacy attacks.

e-Passport Security Technology using Biometric Information Watermarking (바이오정보 워터마킹을 이용한 전자여권 보안기술)

  • Lee, Yong-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.115-124
    • /
    • 2011
  • There has been significant research in security technology such as e-passport standards, as e-passports have been introduced internationally. E-passports combine the latest security technologies such as smart card, public key infrastructure, and biometric recognition, so that these technologies can prevent unauthorized copies and counterfeits. Biometric information stored in e-passports is the most sensitive personal information, and it is expected to bring the highest risk of damages in case of its forgery or duplication. The present e-passport standards cannot handle security features that verify whether its biometric information is copied or not. In this paper, we propose an e-passport security technology in which biometric watermarking is used to prevent the copy of biometric information in the e-passport. The proposed method, biometric watermarking, embeds the invisible date of acquisition into the original data during the e-passport issuing process so that the human visual system cannot perceive its invisibly watermarked information. Then the biometric sample, having its unauthorized copy, is retrieved at the moment of reading the e-passport from the issuing database. The previous e-passport security technology placed an emphasis on both access control readers and anti-cloning chip features, and it is expected that the proposed feature, copy protection of biometric information, will be demanded as the cases of biometric recognition to verify personal identity information has increased.