• Title/Summary/Keyword: 공인화

Search Result 218, Processing Time 0.024 seconds

Establishment of the College for Small Business (소상공인을 위한 전문학교 설립에 대한 연구)

  • Lee, In-Hoi;Oh, Sang-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.10
    • /
    • pp.4884-4892
    • /
    • 2013
  • The purpose of this study was to analyze the external educational environments that small business persons had faced as well as the internal competences of Small Enterprise Development Agency (SEDA), and provide with the directions establishing the small business college. To do so, the study employed PEST analysis and 7S model. As the results of this study, it was quite suggestive that standardization of curriculum and educational facility, qualifications of professional teacher, and rating system and specialization of the college should be considered in order to establish the effective small business college.

Accessibility Evaluation of Accredited Certificate Subscriber Software (공인인증서 가입자 소프트웨어의 접근성 평가)

  • Hong, Kyoung-Soon;Choi, Seong-Eun;Kim, Suk-Il
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.40-53
    • /
    • 2011
  • This paper proposes methods of evaluating and measuring accessibility of accredited certificate subscriber software which is one of crucial applications to submit personal certifications while web surfing. The presented methodology is to evaluate accessibility by using a certain assessment tool and is to normalize accessibility level into points, so that the software developers who are unfamiliar to screen readers can easily perform accessibility evaluation. The software from the major 78 organizations has went through the assessment. Those of 48 organizations, 62% out of the total, have acquired less than 70 points, implying the software of them is not accessible by the blind. The remaining 18 software got the highest point(88), are partly inaccessible by the blind that uses screen readers. This implies that the proposed methods are applicable to evaluate the accessibility of the software.

A Study on Tainting Technique for leaking official certificates Malicious App Detection in Android (공인인증서 유출형 안드로이드 악성앱 탐지를 위한 Tainting 기법 활용 연구)

  • Yoon, Hanj Jae;Lee, Man Hee
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.27-35
    • /
    • 2018
  • The certificate is electronic information issued by an accredited certification body to certify an individual or to prevent forgery and alteration between communications. Certified certificates are stored in PCs and smart phones in the form of encrypted files and are used to prove individuals when using Internet banking and smart banking services. Among the rapidly growing Android-based malicious applications are malicious apps that leak personal information, especially certificates that exist in the form of files. This paper proposes a method for judging whether malicious codes leak certificates by using DroidBox, an Android-based dynamic analysis tool.

  • PDF

A Satisfaction Analysis on the Small Business Support Systems in Gyeongnam (소상공인지원제도에 대한 소상공인 만족도 분석: 경남지역 사례 중심)

  • Jeong, Gab Soo;Seol, Byung Moon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.11 no.6
    • /
    • pp.153-161
    • /
    • 2016
  • Small business start-up competition in the market has become overheated. It is effected by early retirement and unemployment, specially youth employment. It is a research on small business owners' satisfaction of SEMAS(Small Enterprise and Market Service) based on the funding policy, education and consulting program. It has surveyed 272 small business owners living Gyeongsangnam-province from January 2013 to September 2015. In addition, it analyzes some factors such as motivation, business model, item, owner's experience, sales and demographic by small business owner. Analysis results, the satisfaction of small business that uses support system is shown to be significantly related with education degree, entrepreneur motivation, and business kind is partly related. It will conduct a decision-making governor to help small business owners entered the start-up market and.

  • PDF

A Case Study on Factors of Family Business Succession of Small Enterprise (소상공인 가업승계 요인에 대한 사례 연구)

  • Choi, Shin hea
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.240-252
    • /
    • 2022
  • A lot of research has been done on the succession of family businesses. However, there has been little discussion and policy approach on the succession of small enterprise. Since '19, the government has established a policy on the concept of small enterprise succession. Therefore, the time has come for a research system to establish the concept of small enterprise succession. Accordingly, this study tried to apply it to small enterprise based on the existing discussion on family business succession. As a result, even for small business owners, the internal factors of enterprise, spirit, and craftsmanship had an important influence on succession. However, small enterprise have a characteristic that ambiguity of authority occurs because they are not yet systematized. Also, role ambiguity occurs in performing various roles, which can be viewed as a characteristic of small enterprise. Prior to empirical research on the family business succession of small enterprise, this study tried to present the basis for the need for research in this field by presenting the definition and conceptualization of small enterprise succession through case study.

Cognition Levels of the Success Factors for Governmental Support Policies to Small Business Cooperation (소상공인 협업화 지원 정책의 성공요인 인식 수준)

  • Suh, Yong-Sung;Oh, Sang-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6613-6620
    • /
    • 2014
  • In this paper, 228 cooperations supported by government were surveyed on the cognition levels of 5 factors for successful policies that support small business cooperation. Goal importance, awareness stage of importance, and current concerning level were scored to each question of factors. Using the results of previous studies, the maturity of each success factor, and the forecast time to mature and maturity of each question were analyzed. The results were compared with the results of a study precedent. Moreover, the changes in the participants' recognition levels were reviewed between before and after government's support. These comparative studies reflect government policies. Despite the government's supporting policies aided on building cooperation positively, the participants still worry about the decreasing government support. To allay these concerns, government policies should be implemented continuously to promote cooperation rather than a one-time support.

Securing the Private Key in the Digital Certificate Using a Graphic Password (그래픽 비밀번호를 활용한 공인인증서 개인키 보호방법에 관한 연구)

  • Kang, Byung-Hoon;Kim, Beom-Soo;Kim, Kyung-Kyu
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.1-16
    • /
    • 2011
  • A digital certificate mandated by the Electronic Signature Act has become familiar in our daily lives as 95% of the economically active population hold certificates. Due to upgrades to 256 bit level security that have become effective recently, the security and reliability of digital certificates are expected to increase. Digital certificates based on Public Key Infrastructure (PKI) have been known as "no big problem," but the possibility of password exposure in cases of leaked digital certificates still exists. To minimize this vulnerability, various existing studies have introduced alternative password methods, expansion of certificate storage media, and multiple certification methods. These methods perform enhanced functions but also have limitations including the fact that the secureness of passwords is not guaranteed. This study suggests an alternative method for enhancing the level of password secureness as a way to improve password security. This new method improves security management and enhances the convenience of using digital technologies. The results may be used for developing digital certificate related security technologies and research in the future.

A Study of Risk Management Process for Authorized Economic Operator, Utilizing Six Sigma Methodology (AEO 공인을 위한 위험관리절차에서의 6시그마 기법 접목 방법에 관한 연구)

  • Ma, Soon-Deuk;Ree, Sang-Bok
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2009.10a
    • /
    • pp.40-47
    • /
    • 2009
  • 911테러 이후, 세계 무역환경은 물류의 안전과 원활화를 요구하게 되었고, 이런 패러다임의 변화에 따라 우리나라도 '09년 4월 AEO공인 제도를 도입하였다. 무역공급망(Supply Chain) 기업은 AEO 공인을 받기 위하여 내부통제시스템을 구축하여야 하며, 그 중 적정한 위험관리절차를 갖추어야 하는 바, 동 절차에 대한 특별한 방법론이 아직 제시되지 않은 상태이다. 따라서, AEO와 관련된 위험관리방법론을 연구하고, 이를 기업에 확산되어 있는 6시그마 방법론과 접목시켜 기업의 AEO 공인을 지원하고 기업활동의 효율성을 높이고자 함이다.

  • PDF

A Methodology for the Improvement of Accredited Digital Certificate Integrating FIDO Biometric Technology and TrustZone (FIDO 생체기술과 안전영역을 연계한 공인인증서 효율화 방법)

  • Cho, Hwa-Gun;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.183-193
    • /
    • 2017
  • Digital accredited certificates issued under the Digital Signature Act provide essential functionalities for online service, so certificates are used for various services such as online banking, e-government. However, certificates can be stolen by hackers and users need to install separate software to use certificates. Recently FIDO, which aims to solve the problems of password-based authentication and the lack of interoperability between authentication methods, is used for biometric authentication and TrustZone, hardware-based secure environment, is used for safe smartphone usage. In this paper, the new service method is suggested which uses FIDO-based biometric authentication and stores certificates in TrustZone. This method can not only improve security and convenience but also be easily applied to the service because it uses built-in functionalities of new smartphones such as biometric sensors and TrustZone. It is expected that people can use certificates in a safe and convenient way with this method.