• Title/Summary/Keyword: 대처행위

Search Result 190, Processing Time 0.023 seconds

A Study on the Effects of Characteristics of Female Corporate Founders on Managerial Achievements (창업 여성CEO의 특성이 경영성과에 미치는 영향 연구)

  • Min, Kyung-Sae;Ahn, Sang-Chul
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.6 no.4
    • /
    • pp.1-20
    • /
    • 2011
  • Although it is a limited and exploratory study, it is focused on figuring out correlations between characteristics of female CEOs who founded a company and their managerial achievements. Toward this end, the study is focused on generating such determinants as background characteristics, behavioral features and competence traits that characterize female CEOs based on previous studies and existing literature while suggesting study models and assumptions on correlations between these factors and managerial achievements and conducting empirical analyses. Results of the empirical analyses are as follows. First, regression analyses that verified relationships between background characteristics of female corporate founders and managerial achievements have found that major subjects had a significant effect, but that their experiences in corporate foundation and careers did not. Second, regression analyses that verified behavioral characteristics of female corporate CEOs and their managerial achievements have found that credibility and the motive for corporation foundation had a significant impact, but that efforts to counter risks factors did not. Third, regression analyses that verified relationships between competence features of female corporate CEOs and managerial achievements have found that managerial control capability had a significant impact, but that entrepreneurial capability and technical capability.

  • PDF

Milestone State Generation Methods for Failure Handling of Autonomous Robots (자율 로봇의 오류 보정을 위한 이정표 상태 생성 방법)

  • Han, Hyun-Goo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.6
    • /
    • pp.2760-2769
    • /
    • 2011
  • An intelligent autonomous robot generates a plan to achieve a goal. A plan is a sequence of robot actions that accomplish a given mission by being successfully executed. However, in the complex and dynamic real world, a robot may encounter unexpected situations and may not execute its planned actions any more. Therefore, an intelligent autonomous robot must prepare an efficient handling process to cope with these situations to successfully complete a given mission. Plan repair with milestone states is an efficient method to cope with the situation. It retains the advantages of other plan repair procedures. This paper proposes a regressive method of formulating milestone states and a method of assigning weighting values on conditions that compose a milestone state. The task to repair a plan may employ the weighting values as its job priority. The regressive method formulates less complex milestone states and leads to the conditions of a milestone state to take pertinent weighting values for an efficient handling procedure to repair a plan with milestone states.

A Design and Implementation of Anomaly Detection Model based the Web Traffic Trend Analysis (웹 트래픽 추이 분석 기반 비정상행위 탐지 모델의 설계 및 구현)

  • Jang, Sung-Min;Park, Soon-Dong
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.5
    • /
    • pp.715-724
    • /
    • 2005
  • Recently many important systems that used to be operated in a closed environment are now providing web services and these kinds of web-based services are often an easy and common target of attacks. In addition, the great variety of web content and applications cause the development of new various intrusion technologies, while the misuse-based intrusion detection technology cannot keep the peace with the attacks and it seems to lack the capability to deal with such various new security threats, As a result it is necessary to research and develop new types of detection technologies that can detect newly developed attacks and intrusions as well as to be able to deal with previous types of exploits. In this paper, a HTTP traffic model is tested for its anomaly by using a HTTP request traffic pattern analysis and the field information analysis of the HTTP packet. Consequently, the HTTP traffic models by applying anomaly tests is designed and established.

  • PDF

An Optimum-adaptive Intrusion Detection System Using a Mobile Code (모바일 코드를 이용한 최적적응 침입탐지시스템)

  • Pang Se-chung;Kim Yang-woo;Kim Yoon-hee;Lee Phil-Woo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.45-52
    • /
    • 2005
  • A damage scale of information property has been increasing rapidly by various illegal actions of information systems, which result from dysfunction of a knowledge society. Reinforcement in criminal investigation requests of network security has accelerated research and development of Intrusion Detection Systems(IDSs), which report intrusion-detection about these illegal actions. Due to limited designs of early IDSs, it is hard for the IDSs to cope with tricks to go around IDS as well as false-positive and false-negative trials in various network environments. In this paper, we showed that this kind of problems can be solved by using a Virtual Protocol Stack(VPS) that possesses automatic learning ability through an optimum-adaptive mobile code. Therefore, the enhanced IDS adapts dynamically to various network environments in consideration of monitored and self-learned network status. Moreover, it is shown that Insertion/Evasion attacks can be actively detected. Finally, we discussed that this method can be expanded to an intrusion detection technique that possesses adaptability in the various mixed network environments.

A Study on the Improvement of Methodologies for Establishing a Vulnerability Classification of Chemical Terrorism in Public Facilities (다중이용시설 화학테러 취약등급설정 방법론 개선에 대한 연구)

  • Joo, Sun Ho;Kim, Si-Kuk;Hong, Sungchul
    • Fire Science and Engineering
    • /
    • v.34 no.1
    • /
    • pp.89-102
    • /
    • 2020
  • Chemical terrorism using toxic and flammable gases, which could be fatal to the health of the human body, poses a serious threat to the security of most advanced countries, as well as those that are suffering from local disputes, due to the asymmetric information that exists between terrorist actors and victims. The countermeasures against chemical terrorism can be roughly divided into three stages: prevention, response, and probation. The critical factors for each professional response agency, and the personnel that determine the degree and range of chemical terrorism damage, are performing missions successfully in the process of the prevention and the response stage against chemical terrorism. To do this, conducting objective and systematical assessments on facilities that could potentially be the subject of chemical terrorism is more important than anything. In this study, we compared the existing domestic and foreign vulnerable classification systems for chemical terrorism, reviewed the current direction of improvement in domestic classification systems, and suggested more scientific and systematic methodologies through the vulnerability assessment on an actual public facility sample.

Reexamination of the Cyber Insult Crime For securing the Internet Ethics (인터넷윤리 확보를 위한 사이버모욕죄의 재검토)

  • Kim, Jae-Nam;Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.6
    • /
    • pp.111-120
    • /
    • 2013
  • Recently, in the cyberspace, the posts that have only insults and abuses without the fact are getting spread rapidly as a trend, it makes the damage to people also, and the social concerns have been raised about its phenomenon. Meanwhile, because of the insulting actions that performed in cyberspace, the results of infringement of personal rights conditions getting difficult to repair. Also, it is difficult to find who the person who acts as a perpetrator is. So, it is hard to report a crime or sued for damages, also, it is really difficult to deal with a criminal contempt. Also, cause of a lot of deficient areas, the Cyber Insult Crime act is need and strengthened penalties or Mitigation about the crime subject to victim's complaint are need. However, give the criminal penalties to criminal is sufficient. So, to construct a new special criminal law, it is not advisable. Thus, governed by the Criminal Code Section 311 is preferably.

Prohibition Clauses of Business of Money Changing on the Game Industry Promotion Act of 2007 (게임산업진흥법상 환전업금지 조항의 의의와 해석)

  • Hwang, Seung-Heum
    • Journal of Korea Game Society
    • /
    • v.7 no.2
    • /
    • pp.61-72
    • /
    • 2007
  • Prohibition Clauses of Business of Money Changing(${\S}32(1)7$) on the Game Industry Promotion Act of 2007 was introduced for the purpose of preventing game from becoming gambling. By making the independent requisite of constituting a crime that there was no criminal punishment former times, it is possible actively to deal with mixing of game and gambling. Prohibition Clauses of Business of Money Changing prevent the material or formless results that are obtained on the use of game from making a business of money change, intermediation of money change, or re-purchase of it. The material or formless results mean points, prizes, game moneys, or game data that is obtained on the abnormal use of a game. Most real money trade of a game item will be pull into the application of Prohibition Clauses of Business of Money Changing on the interpretation of it. Therefore this clauses have a tremendous effect upon the business of sweated workshops and intermediation web sites of game items. None the less Prohibition Clauses of Business of Money Changing will have positive influence to the future of game industry through the separation of game and gambling.

  • PDF

Choice of Law in International Antitrust Law (국제카르텔분쟁사건의 준거법)

  • Kim, Yong-Jin
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.801-828
    • /
    • 2013
  • This essay provides a legislative perspective on conflict-of-laws issues in the area of antitrust law. A consistent focus on the affected market question of applicable law is possible and yields content and acceptable results. The law applicable to damages claims should follow the law applicable to the antitrust relation itself. It is problematic, however, where more than one market is affected. In my view, the European perspective provides one general lesson for us. We are not yet prepared to accept american-style of class action in the field of antitrust law, at least until the european have made their legislative decision. Nevertheless we should make our antitrust system more effective, so that it would have strong deterrence to anti-competitive conducts. In this paper I present a proposal for adoption of a international conflict of law instrument, possibly a regulation, on damages actions for breach of art. 32 Korean Anti-trust Law.

A Survey about the Knowledge, Attitudes and Behavior for Radiation Safety Management of Operating Room Nurse and Dental Hygienists (수술실 간호사와 치과위생사의 방사선 안전관리 지식과 태도 및 행위에 대한 비교조사)

  • Yoon, Jung-Ae;Yoon, Young-Suk
    • Journal of dental hygiene science
    • /
    • v.14 no.2
    • /
    • pp.230-239
    • /
    • 2014
  • This study is to promote awareness to be exposed to radiation with identifying knowledge, attitudes and behavior for radiation safety management of the operating room nurse and dental hygienist. And the following results were obtained through questionnaire survey to deduct the education to prevent potential risks in advance and implication to be useful on education program. First, based on the level of knowledge for radiation safety management, 10.57 for dental hygienists, 9.55 for the nurse out of 15 points (p<0.001); based on the level of attitudes for radiation safety management, 4.64 for dental hygienists, 4.67 for the nurse out of 5 points (p<0.001); and based on the level of behavior for radiation safety management, 3.27 for dental hygienists, 2.93 for the nurse out of 5 points (p<0.001). Second, the result for checking the relation with knowledge, attitudes and behavior for radiation safety management, the knowledge of radiation safety management has correlation with attitudes and behavior for radiation safety management statistically (p<0.001).

A Study for Autonomous Intelligence of Computer-Generated Forces (가상군(Computer-Generated Forces)의 자율지능화 방안 연구)

  • Han, Chang-Hee;Cho, Jun-Ho;Lee, Sung-Ki
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.1
    • /
    • pp.69-77
    • /
    • 2011
  • Modeling and Simulation(M&S) technology gets an attention from various parts such as industry and military. Especially, military uses the technology to cope with a different situation from the one in the Cold War and maximize the effect of training against the cost in the new environment. In order for the training based on M&S technology to be effective, the situations of a battlefield and a combat must be more realistically simulated. For this, a technique development on Computer-Generated Forces(CGF) which represents a unit's simulation logic and a human's simulated behaviors is focused. The CGF simulating a human's behaviors can be used in representing an enemy force, experimenting behaviors in a future war, and developing a new combat idea. This paper describes a methodology to accomplish Computer-Generated Forces' autonomous intelligence. It explains the process of applying a task behavior list based on the METT+T element onto CGFs. On the other hand, in the domain knowledge of military field manual, fuzzy facts such as "fast" and "sufficient" whose real values should be decided by domain experts can be easily found. In order to efficiently implement military simulation logics involved with such subjectivity, using a fuzzy inference methodology can be effective. In this study, a fuzzy inference methodology is also applied.