• Title/Summary/Keyword: 공공데이터 분석

Search Result 859, Processing Time 0.028 seconds

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

Analysis on Factors Influencing Welfare Spending of Local Authority : Implementing the Detailed Data Extracted from the Social Security Information System (지방자치단체 자체 복지사업 지출 영향요인 분석 : 사회보장정보시스템을 통한 접근)

  • Kim, Kyoung-June;Ham, Young-Jin;Lee, Ki-Dong
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.141-156
    • /
    • 2013
  • Researchers in welfare services of local government in Korea have rather been on isolated issues as disables, childcare, aging phenomenon, etc. (Kang, 2004; Jung et al., 2009). Lately, local officials, yet, realize that they need more comprehensive welfare services for all residents, not just for above-mentioned focused groups. Still cases dealt with focused group approach have been a main research stream due to various reason(Jung et al., 2009; Lee, 2009; Jang, 2011). Social Security Information System is an information system that comprehensively manages 292 welfare benefits provided by 17 ministries and 40 thousand welfare services provided by 230 local authorities in Korea. The purpose of the system is to improve efficiency of social welfare delivery process. The study of local government expenditure has been on the rise over the last few decades after the restarting the local autonomy, but these studies have limitations on data collection. Measurement of a local government's welfare efforts(spending) has been primarily on expenditures or budget for an individual, set aside for welfare. This practice of using monetary value for an individual as a "proxy value" for welfare effort(spending) is based on the assumption that expenditure is directly linked to welfare efforts(Lee et al., 2007). This expenditure/budget approach commonly uses total welfare amount or percentage figure as dependent variables (Wildavsky, 1985; Lee et al., 2007; Kang, 2000). However, current practice of using actual amount being used or percentage figure as a dependent variable may have some limitation; since budget or expenditure is greatly influenced by the total budget of a local government, relying on such monetary value may create inflate or deflate the true "welfare effort" (Jang, 2012). In addition, government budget usually contain a large amount of administrative cost, i.e., salary, for local officials, which is highly unrelated to the actual welfare expenditure (Jang, 2011). This paper used local government welfare service data from the detailed data sets linked to the Social Security Information System. The purpose of this paper is to analyze the factors that affect social welfare spending of 230 local authorities in 2012. The paper applied multiple regression based model to analyze the pooled financial data from the system. Based on the regression analysis, the following factors affecting self-funded welfare spending were identified. In our research model, we use the welfare budget/total budget(%) of a local government as a true measurement for a local government's welfare effort(spending). Doing so, we exclude central government subsidies or support being used for local welfare service. It is because central government welfare support does not truly reflect the welfare efforts(spending) of a local. The dependent variable of this paper is the volume of the welfare spending and the independent variables of the model are comprised of three categories, in terms of socio-demographic perspectives, the local economy and the financial capacity of local government. This paper categorized local authorities into 3 groups, districts, and cities and suburb areas. The model used a dummy variable as the control variable (local political factor). This paper demonstrated that the volume of the welfare spending for the welfare services is commonly influenced by the ratio of welfare budget to total local budget, the population of infants, self-reliance ratio and the level of unemployment factor. Interestingly, the influential factors are different by the size of local government. Analysis of determinants of local government self-welfare spending, we found a significant effect of local Gov. Finance characteristic in degree of the local government's financial independence, financial independence rate, rate of social welfare budget, and regional economic in opening-to-application ratio, and sociology of population in rate of infants. The result means that local authorities should have differentiated welfare strategies according to their conditions and circumstances. There is a meaning that this paper has successfully proven the significant factors influencing welfare spending of local government in Korea.

A Study on Intelligent Value Chain Network System based on Firms' Information (기업정보 기반 지능형 밸류체인 네트워크 시스템에 관한 연구)

  • Sung, Tae-Eung;Kim, Kang-Hoe;Moon, Young-Su;Lee, Ho-Shin
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.67-88
    • /
    • 2018
  • Until recently, as we recognize the significance of sustainable growth and competitiveness of small-and-medium sized enterprises (SMEs), governmental support for tangible resources such as R&D, manpower, funds, etc. has been mainly provided. However, it is also true that the inefficiency of support systems such as underestimated or redundant support has been raised because there exist conflicting policies in terms of appropriateness, effectiveness and efficiency of business support. From the perspective of the government or a company, we believe that due to limited resources of SMEs technology development and capacity enhancement through collaboration with external sources is the basis for creating competitive advantage for companies, and also emphasize value creation activities for it. This is why value chain network analysis is necessary in order to analyze inter-company deal relationships from a series of value chains and visualize results through establishing knowledge ecosystems at the corporate level. There exist Technology Opportunity Discovery (TOD) system that provides information on relevant products or technology status of companies with patents through retrievals over patent, product, or company name, CRETOP and KISLINE which both allow to view company (financial) information and credit information, but there exists no online system that provides a list of similar (competitive) companies based on the analysis of value chain network or information on potential clients or demanders that can have business deals in future. Therefore, we focus on the "Value Chain Network System (VCNS)", a support partner for planning the corporate business strategy developed and managed by KISTI, and investigate the types of embedded network-based analysis modules, databases (D/Bs) to support them, and how to utilize the system efficiently. Further we explore the function of network visualization in intelligent value chain analysis system which becomes the core information to understand industrial structure ystem and to develop a company's new product development. In order for a company to have the competitive superiority over other companies, it is necessary to identify who are the competitors with patents or products currently being produced, and searching for similar companies or competitors by each type of industry is the key to securing competitiveness in the commercialization of the target company. In addition, transaction information, which becomes business activity between companies, plays an important role in providing information regarding potential customers when both parties enter similar fields together. Identifying a competitor at the enterprise or industry level by using a network map based on such inter-company sales information can be implemented as a core module of value chain analysis. The Value Chain Network System (VCNS) combines the concepts of value chain and industrial structure analysis with corporate information simply collected to date, so that it can grasp not only the market competition situation of individual companies but also the value chain relationship of a specific industry. Especially, it can be useful as an information analysis tool at the corporate level such as identification of industry structure, identification of competitor trends, analysis of competitors, locating suppliers (sellers) and demanders (buyers), industry trends by item, finding promising items, finding new entrants, finding core companies and items by value chain, and recognizing the patents with corresponding companies, etc. In addition, based on the objectivity and reliability of the analysis results from transaction deals information and financial data, it is expected that value chain network system will be utilized for various purposes such as information support for business evaluation, R&D decision support and mid-term or short-term demand forecasting, in particular to more than 15,000 member companies in Korea, employees in R&D service sectors government-funded research institutes and public organizations. In order to strengthen business competitiveness of companies, technology, patent and market information have been provided so far mainly by government agencies and private research-and-development service companies. This service has been presented in frames of patent analysis (mainly for rating, quantitative analysis) or market analysis (for market prediction and demand forecasting based on market reports). However, there was a limitation to solving the lack of information, which is one of the difficulties that firms in Korea often face in the stage of commercialization. In particular, it is much more difficult to obtain information about competitors and potential candidates. In this study, the real-time value chain analysis and visualization service module based on the proposed network map and the data in hands is compared with the expected market share, estimated sales volume, contact information (which implies potential suppliers for raw material / parts, and potential demanders for complete products / modules). In future research, we intend to carry out the in-depth research for further investigating the indices of competitive factors through participation of research subjects and newly developing competitive indices for competitors or substitute items, and to additively promoting with data mining techniques and algorithms for improving the performance of VCNS.

Analysis of Soil Changes in Vegetable LID Facilities (식생형 LID 시설의 내부 토양 변화 분석)

  • Lee, Seungjae;Yoon, Yeo-jin
    • Journal of Wetlands Research
    • /
    • v.24 no.3
    • /
    • pp.204-212
    • /
    • 2022
  • The LID technique began to be applied in Korea after 2009, and LID facilities are installed and operated for rainwater management in business districts such as the Ministry of Environment, the Ministry of Land, Infrastructure and Transport, and LH Corporation, public institutions, commercial land, housing, parks, and schools. However, looking at domestic cases, the application cases and operation periods are insufficient compared to those outside the country, so appropriate design standards and measures for operation and maintenance are insufficient. In particular, LID facilities constructed using LID techniques need to maintain the environment inside LID facilities because hydrological and environmental effects are expressed by material circulation and energy flow. The LID facility is designed with the treatment capacity planned for the water circulation target, and the proper maintenance, vegetation, and soil conditions are periodically identified, and the efficiency is maintained as much as possible. In other words, the soil created in LID is a very important design element because LID facilities are expected to have effects such as water pollution reduction, flood reduction, water resource acquisition, and temperature reduction while increasing water storage and penetration capacity through water circulation construction. In order to maintain and manage the functions of LID facilities accurately, the current state of the facilities and the cycle of replacement and maintenance should be accurately known through various quantitative data such as soil contamination, snow removal effects, and vegetation criteria. This study was conducted to investigate the current status of LID facilities installed in Korea from 2009 to 2020, and analyze soil changes through the continuity and current status of LID facilities applied over the past 10 years after collecting soil samples from the soil layer. Through analysis of Saturn, organic matter, hardness, water contents, pH, electrical conductivity, and salt, some vegetation-type LID facilities more than 5 to 7 years after construction showed results corresponding to the lower grade of landscape design. Facilities below the lower level can be recognized as a point of time when maintenance is necessary in a state that may cause problems in soil permeability and vegetation growth. Accordingly, it was found that LID facilities should be managed through soil replacement and replacement.

The Determinants of Digital Trust of Senior Consumers in the Era of Digital Transformation (디지털 트랜스포메이션 시대, 시니어 소비자의 디지털 소비여건 신뢰 형성 요인 연구)

  • Mina Jun;Miyea Kim;Jeongsoo Han
    • Knowledge Management Research
    • /
    • v.23 no.4
    • /
    • pp.91-112
    • /
    • 2022
  • In order to improve the quality of consumption in senior generation, it is necessary to build trust in the digital consumption environment. However, there are limitations from previous researches on consumption in the digital environment that has mainly focused on Millennial and Z generations. Therefore, this study aims to examine the antecedents of digital consumption trust and to explore the market segments of senior generation created by the dynamics of these antecedents. In addition, in order to provide practical implications, we investigate the difference in the level of perceived digital consumption trust using segmentation. This study, therefore, used 2021 Korea's consumer life index data conducted by the Korea Consumer Agency for general consumers, and only consumer data of 60s and older are extracted for the analysis. As a result, we confirm from the main results that the three antecedents, consumer competency, perceived corporate responsibility, and local community's problem-solving environment, are significant in building the digital consumption trust in the senior generation. It is academically significant in this aspect to look at approaches to improve senior customers' trust in digital consumption circumstances by dividing generations because generations exhibit varying levels of understanding of online consumption or digital consumption conditions. It is academically significant in this aspect to look at approaches to improve senior customers' trust in digital consumption circumstances by dividing generations because generations exhibit varying levels of understanding of online consumption or digital consumption conditions. Additionally, it is proposed as a practical implication that it should be managed so that significant improvements of customers, businesses, and regional public institutions are developed in order to allow the senior consumers to prepare trusted digital consumption circumstances.

A Study on Visual Identity of Korean Government (우리나라 행정부의 시각 정체성 연구)

  • Cho, Ju-Eun
    • Archives of design research
    • /
    • v.19 no.2 s.64
    • /
    • pp.261-272
    • /
    • 2006
  • As we cannot think of our lives without a nation, it is closely related to almost every part of our daily lives. The role of government is becoming more important in the complex modern society as an essential element of national authority even though the government has indirect and secondary characteristics in its functional performance. Therefore, the government has to be efficient in planning and executing its policies, and it needs to be representative and fair as part of a national authoritative community. In the 21st century when symbolic and cultural importance of images are becoming more important, it is crucial for the government organizations to have an integrated identity design system that can satisfy both of these requirements of the government. However, the C.I.(Corporate Identity) of each Korean administrative branch has been developed separately and sporadically, which resulted in lack of consistency as part of the government. Shape and material of their C.I.s that follow short term design trend and popularity also lack uniqueness which can be distinguished from those of any private corporation. This may show that our government lacks systematic administrative capability, since image of a feature represents its characteristics and reality, and their recognition and evaluation from others become identity of the feature. In this perspective, the purpose of this thesis is to suggest an identity design system that has certain rules and regularity with wide variety of possible alterations for the central administration in Korea. In order to represent this visually, identity design system with both integrity and variety of possible alteration is created based on traditional Korean culture, especially the concept of Umyang-ohaeng and Samjae.

  • PDF

A Study on the Crime Prevention Design and Consumer Perception (CPTED) of Multi-Family Housing in China (중국 공동주택의 범죄 예방을 위한 디자인과 소비자의 인식에 관한 연구)

  • Kong, De Xin;Lee, Dong Hun;Park, Hae Rim
    • Journal of Service Research and Studies
    • /
    • v.14 no.1
    • /
    • pp.63-76
    • /
    • 2024
  • Multi-family housing plays a crucial role as a living and experiencing space, and its environment has a direct impact on the well-being and stability of its residents. Therefore, Crime Prevention Design (CPTED) for multi-family housing is of utmost importance. However, crime-related data in China is not disclosed to the public because of its specificity, making it difficult for researchers to conduct further in-depth studies based on accurate crime data. As a result, the establishment and application of CPTED theory in terms of crime prevention is limited and delayed. This study aims to explore three aspects of CPTED in multi-family housing as perceived by home-buying consumers. It investigated consumer perception of the CPTED, the importance of each element and ways to increase awareness of CPTED in multifamily housing in order to effectively improve multifamily crime prevention design principles and further enhance public safety. This study examined the current state and future trends of CPTED in China by analyzing relevant research reports and literature, aiming to gain insights into the crime prevention awareness of Chinese homeowners. In addition, a survey was conducted on Chinese consumers to unravel the importance of CPTED and increase awareness of its various elements in multifamily-family. This study used a Likert scale and SPSS reliability analysis to determine the cognitive status of multi-family CPTED, the importance of each element, and proposed an improvement plan based on the analysis results. As this study was limited by the difficulty of implementation and the lack of validation of its practical effectiveness, it is recommended that future research needs to validate the effectiveness of crime prevention designs and produce more practical results. Furthermore, it is crucial to utilize this study to inform the implementation of security solutions that are tailored to the unique characteristics of each district. Additionally, it is important to offer guidance on how to enhance community safety by increasing residents' awareness of security through education and information dissemination. The author hopes that the representative multi-family CPTED awareness, the importance of each element, and plans for improvement shall be summarized from this study, and provide foundational data for the future development of CPTED based on the Chinese region.

Review of Family Planning / Health Integration Efforts and Evaluation Results in Korea (가족계획과 보건사업의 통합시도 및 평가결과)

  • Bang, Sook
    • Korea journal of population studies
    • /
    • v.10 no.2
    • /
    • pp.58-81
    • /
    • 1987
  • The purpose of this study is to examine major factors that affect patterns of living arrangements of older Korean noncitizens in the United States using the 1990 8% Public Use Microdata Sample(PUMS). In order to do so, I analyzed the effects of four factors including acculturation(English proficiency and Age at migration), economic circumstances(Personal Income and Supplemental Security Income: SSI receipt), health status(Mobility and Personal care limitation), and the ethnic community. The results show that acculturation and economic circumstances play an important role in determining the patterns of living arrangements among older Korean aliens, whereas the health status and the ethnic community do not show consistent effects. Regardless of marital status, the impact of age at migration is positively associated with solitary living of older Korean noncitizens, though, the effect of English proficiency show the opposite direction in accordance with marital status. That is, among nonmarried elders, those who cannot speak English are more likely to live alone. The case is reverse for married elders. The impact of economic feasibility is also positively associated with independent living arrangements. Those who receive SSI are much more likely to live apart from family, and elders whose annual personal income between $5,001 and $10,000 have the greatest propensity of solitary living-a large proportion of their income source is SSI. Individuals who receive SSI are also qualified to collect Medicaid, food stamps, rent subsidies, and other welfare benefits. In a sense, the economic feasibility provided by welfare benefits is the key determinant of independent living of older Korean noncitizens. Therefore, the recent welfare reform which denies legal aliens welfare benefits such as SSI and food stamps will severly affect the present living arrangements of older Korean aliens, and give economic burden to their family member The findings also show that there are significant differences within the elderly Korean Americans in terms of demographics, income, fertility, health status, and patterns of living arrangements by U.S. citizenship status. In particular, after controlling for age at migration as a proxy for acculturation, there is a statistically significant variation in living arrangements between elderly Korean noncitizens and naturalized citizens. For both theoretical and methodological reasons, future research on minority aging needs to investigate the concept of U.S. citizenship status for its impact on patterns of living arrangements among the minority elderly.

  • PDF

Survey of Physicochemical Methods and Economic Analysis of Domestic Wastewater Treatment Plant for Advanced Treatment of Phosphorus Removal (총인 수질기준강화를 위한 국내 하수종말처리장의 물리화학적처리 특성조사 및 경제성 분석)

  • Park, Hye-Young;Park, Sang-Min;Lee, Ki-Cheol;Kwon, Oh-Sang;Yu, Soon-Ju;Kim, Shin-Jo
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.33 no.3
    • /
    • pp.212-221
    • /
    • 2011
  • Wastewater treatment plants (WWTPs) are required to meet the reinforced discharge standards which are differentiated as 0.2, 0.3 and 0.5 mg-TP/L for the district I, II and III, respectively. Although most of WWTPs are operating advanced biological phosphorus removal system, the supplementary phosphorus treatment facility using chemical addition should be required almost at all WWTPs. Therefore, water quality data from several exemplary full-scale plants operating phosphorus treatment process were analyzed to evaluate the reliability of removal performance. Additionally, a series of jar tests were conducted to find optimal coagulants dose for phosphorus removal by chemical precipitation and to describe characteristics of the reaction and sludge production. Chemical costs and the increasing sludge volume in physicochemical phosphorus removal process were estimated based on the results of jar tests. The minimum coagulant (aluminium sulfate and poly aluminium chloride) doses to keep TP concentration below 0.5 and 0.2 mg/L were around 25 and 30 mg/L (as $Al_2O_3$), respectively, in the mixed liquor of activated sludge. In the tertiary treatment facility, relatively lower coagulant doses of 1/12~1/3 the minimum doses for activated sludge were required to achieve the same TP concentrations of 0.2~0.5 mg/L. Increase in suspended solids concentration due to chemical precipitates in mixed liquor was estimated at 10~11%, compared to the concentration without chemical addition. When coagulant was added into mixed liquor, chemical (aluminium sulfate) cost was estimated to be 4~10 times higher than in secondary effluent coagulation/separation process. Sludge production to be wasted was also 4~10 times higher than secondary effluent coagulation/separation process.