• Title/Summary/Keyword: 교정정책

Search Result 81, Processing Time 0.025 seconds

Exploration of Life-cycle Management for Government R&D Program: the Case of Preliminary Feasibility Study on R&D Program (국가연구개발사업의 전주기 관리방안 탐색: 연구개발 부문 예비타당성조사 제도를 중심으로)

  • Ahn, Sang-Jin;Park, Eun-Ji;Lee, Yoon Been
    • Journal of Korea Technology Innovation Society
    • /
    • v.17 no.1
    • /
    • pp.124-145
    • /
    • 2014
  • Market failure occurs when Pareto efficiency is not achieved through market mechanism. In order to solve this problem, government intervene market; paying great attention to the optimum state of resource allocation. However, as the size of government investment in R&D goes up, many professionals emphasize the importance in efficient management system. This work is the result of exploratory study to look into life-cycle management of governmental R&D program. Literature reviews and empirical research on governmental R&D programs elicit improvements for effective life-cycle management of governmental R&D program as follows: consistent discrimination between capital expenditure and recurring expenditure, dual management system by spending properties, implementing total cost management system in capital expenditure, and discrimination between preliminary feasibility study with confirming total program cost in recurring expenditure.

Technology Risk and Social Responsibility of Innovation: The Shut-Down Law and On-line Game as a Post Catch-up Innovation (기술위험과 혁신의 사회적 책임 - 셧다운제와 탈추격형 혁신으로서 온라인게임 -)

  • Jung, Byung Kul
    • Informatization Policy
    • /
    • v.20 no.4
    • /
    • pp.71-88
    • /
    • 2013
  • Probability of technology risk is expected to increase as the post catch-up innovation, characterized by high uncertainty and high risk, would dominate in the coming era of post catchup. Social controversy on online game as a post catch-up innovation is still ongoing, though the shutdown law was enacted by the government. Socio-technical vulnerability causing technology risk paradoxically arose from the world top-level ICT infrastructures and has been reinforced by developmentalism. While both the pros and cons of the regulation fail to recognize dilemma objectively, social cost is brought about and accumulated. With recognizing dilemma between technology innovation and risks, we can tackle technology risks and ensure responsible innovation in post catch-up era.

  • PDF

A Study on Implementation of Family Tree Authoring System for Family Contents (가족콘텐츠 스토리족보(가계도) 저작시스템 설계 및 구현에 관한 연구)

  • Lee, Eun Ryoung;Kim, Kio Chung
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.495-501
    • /
    • 2014
  • This research paper is applying Family Tree with Story Authoring System on the previous research study about writing tool data model on interactive storytelling about family history. In this study, primary personal information holding identity of the person such as name, birthday and family tree, given at birth, was categorized into secondary function defined as "family contents" consisting of family achievements, episodes and experiences. Family contents was restructured to be used as creative ingredients to increase the value and usage of family contents...Family Tree with Story writing system enables users to create text, images, videos and digital contents based on experimental knowledge collected from the first and second generations.

Technical Trend Analysis of a Fault Monitoring System (단층감시시스템 기술현황 분석)

  • Lee, Hyun-Woo
    • The Journal of Engineering Geology
    • /
    • v.21 no.1
    • /
    • pp.87-95
    • /
    • 2011
  • To provide regulatory standards and technical guides that are likely to be required for the Fault Monitoring System (FMS), soon to be installed and operated at the Shin-Wolsong NPP #1, 2 site, technical trend analysis was performed for currently operating geodetic and/or earthquake monitoring systems and activities worldwide, resulting in the identification of several items of concern regarding the design, installation, and operation of FMS at Korean sites. The items are as follows: 1) characterization of site-specific properties (including local noise), 2) selection of measuring instruments/design of appropriate sensitivity for the tectonic behavior of the target, 3) data/electricity backup system, 4) cross-checking and/or cross-referencing system to enhance data quality and credibility, 5) transparent data operation and open-to-the-public policy, and 6) long-term operation in a stable environment.

Consciousness of Fire Officers and Improving the Working Conditions (소방공무원 의식과 처우개선에 관한 연구)

  • Kim, Kook-Rae
    • Fire Science and Engineering
    • /
    • v.21 no.1 s.65
    • /
    • pp.7-18
    • /
    • 2007
  • This research intended to show a reasonable way to improve working conditions of fire officers in Korea. It shows that fire officers have dignity of their social roles even though they have the unfairness in a work time, rewards, promotions and opportunities of overseas training compared with those of other government officers. The unfairness needs to be solved. In addition, there are more demands in fire fighters, but part of a regional government system already composed of 64.06% of fire officers, which means, there are too many fire fighters in one regional government. Therefore, it is difficult to employ more fire fighters. This is one of barriers to prevent from improvement of the working conditions. To improve the working conditions and to overcome the barriers, there are important solutions to counter the problems. Those are application of alternative policies and systems. Compared with the employment system and workload of fire officers in USA, Japan and other advanced countries, it is necessary to introduce alternative policies which include operation of partial three-shift system, expansion of oversees training, expansion of rotational-off system and improvement of employees' welfare policies.

A study on the measurement and tendency of heterophoria using Von Graefe test and Maddox rod test (프리즘 분리법과 마독스 로드 검사법을 이용한 사위측정과 경향 연구)

  • Oh, Hyun-Jin;Doo, Ha-Young;Oh, Seung-Jin
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.485-491
    • /
    • 2012
  • To investigate the difference in the value of horizontal heterophoria measured in phoria test of about normal 72 college students, using both Von Graefe test and Maddox rod test. We used two different methods which are Von Graefe test and Maddox rod test on full correction condition at the long distance. Using Von Graefe test of horizontal heterophoria Measurement, We measured 21 patients(29%) for orthophoria, 36 patients(50%) for exophoria and 15 patients(21%) for esophoria at distance. Using Maddox rod test of horizontal heterophoria Measurement, We measured 36 patients(50%) for orthophoria, 26 patients(36%) for exophoria and 10 patients(14%) for esophoria at distance. Each test average were $0.93{\Delta}$ BI for Von Graefe test, $0.96{\Delta}$ BI for Maddox rod test. We could not find the definite difference about the value of horizontal heterophoria aby testing method. Furthermore, heterphoria AC/A ratio was found to vary from 1.0 to 8.8 and its relationship to refractive error could not be determined.

The differences of tear film for young Korean of a day indoor space (실내 공간 내에서 한국인 청년의 하루 중 눈물층 변화)

  • Oh, Hyun Jin;Lee, Ji-Young
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.535-540
    • /
    • 2012
  • This study is to research the differences of tear film for young people in of a day in a restricted indoor space. The subjects are 58 eyes volunteers for twice preliminary inspection and tear test of a day. 58 healthy individuals with no eye disease, no body disease, orthophoria, corrective visual acuity more than 0.8, binocular spherical equivalence difference over 0.50 diopter, the flattest corneal curvature in horizontal meridian and the steepest corneal curvature in vertical meridian were tested. The uncorrective visual acuity, refractive error, corneal curvature, schirmer test and tear break up test were performed in the morning and afternoon. Schirmer test were $16.0{\pm}7.0mm$ in the morning and $14.1{\pm}7.1mm$ in the afternoon. TBUT were $11.3{\pm}0.6$ sec in the morning and $12.1{\pm}0.9$ sec in the afternoon. They have no significant differences.

Operation Plan for the Management of an Information Security System to Block the Attack Routes of Advanced Persistent Threats (지능형지속위협 공격경로차단 위한 정보보호시스템 운영관리 방안)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.759-761
    • /
    • 2016
  • Recent changes in the information security environment have led to persistent attacks on intelligent assets such as cyber security breaches, leakage of confidential information, and global security threats. Since existing information security systems are not adequate for Advanced Persistent Threat; APT attacks, bypassing attacks, and attacks on encryption packets, therefore, continuous monitoring is required to detect and protect against such attacks. Accordingly, this paper suggests an operation plan for managing an information security system to block the attack routes of advanced persistent threats. This is achieved with identifying the valuable assets for prevention control by establishing information control policies through analyzing the vulnerability and risks to remove potential hazard, as well as constructing detection control through controlling access to servers and conducting surveillance on encrypted communication, and enabling intelligent violation of response by having corrective control through packet tagging, platform security, system backups, and recovery.

  • PDF

A Study on the Development of Intelligent Contents and Interactive Storytelling System (지능형콘텐츠 개발과 인터렉티브 스토리텔링 시스템 연구)

  • Lee, Eun Ryoung;Kim, Kio Chung
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.423-430
    • /
    • 2013
  • The development of information technology introduced digital contents and Social Network Services(SNS), and allowed the virtual transaction and communication between users called "the experience knowledge" advanced from "the objective knowledge." This paper will analyze interactive storytelling system creating different types of stories on narrative genre about family history, personal history and so on. Through analysis on narrative interviews, direct observations, documentations and visual records, contents about CEO story, corporate story, family story and especially family history will be categorized into sampleDB and informationDB. Accumulated contents will allow the user to increase the value and usage of the contents through interactive storytelling system by restructuring the contents on family history. This research has developed writing tool data model using different digital contents such as texts, images and pictures to encourage open communications between first generations and third generations in Korea. Furthermore, researched about connected system on interactive storytelling creation device using various genre of family story that has been data based.

The IOA-Based Intelligent Information Protection System for Response of Advanced Persistent Threats (IOA 기반의 지능형지속위협 대응 위한 지능형 정보보호시스템)

  • Ryu, Chang-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2067-2072
    • /
    • 2016
  • Recently, due to the development of attack techniques that can circumvent existing information protection systems, continuous threats in a form unrecognized by the user have threatened information assets. Therefore, it is necessary to support the prompt responses to anticipated attempts of APT attacks, bypass access attacks, and encryption packet attacks, which the existing systems have difficulty defending against through a single response, and to continuously monitor information protection systems with a defense strategy based on Indicators of Attack (IOA). In this paper, I suggest a centralized intelligent information protection system to support the intelligent response to a violation by discerning important assets through prevention control in a performance impact assessment about information properties in order to block the attack routes of APT; establishing information control policies through weakness/risk analyses in order to remove the risks in advance; establishing detection control by restricting interior/exterior bypass networks to server access and monitoring encrypted communications; and lastly, performing related corrective control through backup/restoration.