• Title/Summary/Keyword: 디지털 위험

Search Result 648, Processing Time 0.032 seconds

An Explorative Study of Big Companies' Expansion Strategies to Digital Businesses (대기업의 디지털 산업 확장 유형의 탐색적 연구)

  • Kim, Iljoo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.6
    • /
    • pp.241-248
    • /
    • 2021
  • Firms have many ways to expand their businesses including M&A. Big companies in online and offline businesses show different ways of expansion with different objectives to expand their digital businesses quickly. Expansions for technical reasons are to acquire technologies they do not have while those for business reasons are M&A for offline companies to have competence in markets by acquiring online companies. Other ways of expansions include spin-off and group participation after investments for startups. Various ways of expansions are chosen because they are optimal choices depending on situations the companies face, and they have different strengths and weaknesses. To analyze the strengths and weaknesses of those options for expansion at this stage would be academically valuable, and also practically meaningful in terms of providing insights for companies' decision making in choosing opitions for expansions. M&A of online companies to make multi-channels by offline companies have risks of failing to internalize online companies and have enough synergy effects. Also, spin-off is a relatively less risky way of expansion while the speed of expansion is slower than establishing external startups with some shares of equity and making them as affiliated companies. External startups are good for speed of expansion while there are risks of legal regulations and negative awareness by the public.

A Study of the Application of 'Digital Heritage ODA' - Focusing on the Myanmar cultural heritage management system - (디지털 문화유산 ODA 적용에 관한 시론적 연구 -미얀마 문화유산 관리시스템을 중심으로-)

  • Jeong, Seongmi
    • Korean Journal of Heritage: History & Science
    • /
    • v.53 no.4
    • /
    • pp.198-215
    • /
    • 2020
  • Official development assistance refers to assistance provided by governments and other public institutions in donor countries, aimed at promoting economic development and social welfare in developing countries. The purpose of this research is to examine the construction process of the "Myanmar Cultural Heritage Management System" that is underway as part of the ODA project to strengthen cultural and artistic capabilities and analyze the achievements and challenges of the Digital Cultural Heritage ODA. The digital cultural heritage management system is intended to achieve the permanent preservation and sustainable utilization of tangible and intangible cultural heritage materials. Cultural heritage can be stored in digital archives, newly approached using computer analysis technology, and information can be used in multiple dimensions. First, the Digital Cultural Heritage ODA was able to permanently preserve cultural heritage content that urgently needed digitalization by overcoming and documenting the "risk" associated with cultural heritage under threat of being extinguished, damaged, degraded, or distorted in Myanmar. Second, information on Myanmar's cultural heritage can be systematically managed and used in many ways through linkages between materials. Third, cultural maps can be implemented that are based on accurate geographical location information as to where cultural heritage is located or inherited. Various items of cultural heritage were collectively and intensively visualized to maximize utility and convenience for academic, policy, and practical purposes. Fourth, we were able to overcome the one-sided limitations of cultural ODA in relations between donor and recipient countries. Fifth, the capacity building program run by officials in charge of the beneficiary country, which could be the most important form of sustainable development in the cultural ODA, was operated together. Sixth, there is an implication that it is an ODA that can be relatively smooth and non-face-to-face in nature, without requiring the movement of manpower between countries during the current global pandemic. However, the following tasks remain to be solved through active discussion and deliberation in the future. First, the content of the data uploaded to the system should be verified. Second, to preserve digital cultural heritage, it must be protected from various threats. For example, it is necessary to train local experts to prepare for errors caused by computer viruses, stored data, or operating systems. Third, due to the nature of the rapidly changing environment of computer technology, measures should also be discussed to address the problems that tend to follow when new versions and programs are developed after the end of the ODA project, or when developers have not continued to manage their programs. Fourth, since the classification system criteria and decisions regarding whether the data will be disclosed or not are set according to Myanmar's political judgment, it is necessary to let the beneficiary country understand the ultimate purpose of the cultural ODA project.

The Effect of PC Software Piracy Attitude and Habit on Illegal Use of Smartphone App (PC소프트웨어 불법사용에 대한 태도와 습관이 스마트폰 앱 불법복제에 미치는 영향)

  • Kim, Joong-Han
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.3
    • /
    • pp.49-61
    • /
    • 2017
  • Due to Proliferation of Mobile Devices, the Global Mobile Application (App) Market is Set to Continue its Impressive Growth Trajectory. However, like other Digital Contents, Prevalent Piracy of Smartphone Apps has Become One of the Major Obstacles to the Growth of the Newborn App Industry. The Objective of this Study is to Examine and Better Understand the Effects of Factors Which has been Known to Influence PC Software Piracy. A Research Model Explaining the Impact of Various Factors to Smartphone App Piracy Attitude and Intention is Constructed Based on Theories of Ethical Behavior. A Survey of College Students was Conducted to Test the Research Model. Findings Show that PC Software Piracy Habit and Attitude have Significant Effects on Smartphone Piracy Attitude and Intention. Beliefs Concerning Judicial and Performance Risks Due to Piracy have Little Effects on Smartphone App Piracy Attitude.

Intelligent Hexapod robot for the support walking of the aged (고령자 보행 지원을 위한 지능형 6족 로봇)

  • Lee, Sang-Mu;Kim, Sang-Hoon
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.534-539
    • /
    • 2008
  • This paper is about intelligent hexapod robot for the support walking of the aged person. The robot using various sensors and small camera has various abilities of forward backward walking, turing left or right, control the speed of walking, avoiding the obstacles and detecting risky situation of fire or gas. To let the aged feel soft and safe walking, we used special servo motor and developed hexapod walking mechanism and effective algorithm.

  • PDF

A Study on the Privacy Literacy Level Measurement for the Proper Exercise of the Right to Informational Self-Determination (올바른 개인정보자기결정권 행사를 위한 프라이버시 리터러시 수준 측정에 관한 연구)

  • Park, Hyang-mi;Yoo, Ji-Yeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.501-522
    • /
    • 2016
  • In the digital era, information is a source of value creation. However, the growing importance of knowledge and information also increases risks and threats. When information is leaked, full recovery is difficult, and additional spreading of risk is high because it is easy to accomplish. Especially personal information is the main target due to its availability. Although individuals normally have to consent to the use of their personal information, they often do not know the use of their information. In such a difficult situation, one must exercise self-determination and privacy. Therefore, the goal of this study is to development a privacy literacy level measurement model for the proper exercise of the right to informational self-determination. It will be presented with the concept of privacy literacy index in order to determine the level of knowledge and understanding and practical application skills for individual. Through the index, we going to enhance the selection ability of information subject, and to promote the judgement and the determination capability for the protection and utilization of personal information.

Development of a Methodology for Detecting Intentional Aggressive Driving Events Using Multi-agent Driving Simulations (Multi-agent 주행 시뮬레이션을 이용한 운전자 주행패턴을 반영한 공격운전 검지기법 개발)

  • KIM, Yunjong;OH, Cheol;CHOE, Byongho;CHOI, Saerona;KIM, Kiyong
    • Journal of Korean Society of Transportation
    • /
    • v.36 no.1
    • /
    • pp.51-65
    • /
    • 2018
  • Intentional aggressive driving (IAD) is defined as a hazardous driving event that the aggressive driver intentionally threatens neighbor drivers with abrupt longitudinal and lateral maneuvering. This study developed a methodology for detecting IAD events based on the analysis of interactions between aggressive driver and normal driver. Three major aggressive events including rear-close following, side-close driving, and sudden deceleration were analyzed to develop the algorithm. Then, driving simulation experiments were conducted using a multi-agent driving simulator to obtain data to be used for the development of the detection algorithm. In order to detect the driver's intention to attack, a relative evaluation index (Erratic Driving Index, EDI) reflecting the driving pattern was derived. The derived IAD event detection algorithm utilizes both the existing absolute detection method and the relative detection method. It is expected that the proposed methodology can be effectively used for detecting IAD events in support of in-vehicle data recorder technology in practice.

Economic Activities in Digital Platforms: Types, Natures, Risks, Policy Suggestions (플랫폼 경제활동에 대한 시론적 고찰: 유형, 특성, 예상위험, 정책대안을 중심으로)

  • Kim, Suyoung;Kang, Myungjoo;Ha, Eunsol
    • 한국사회정책
    • /
    • v.25 no.4
    • /
    • pp.199-231
    • /
    • 2018
  • The development of ICT has led to changes in the pattern and the meaning of work and requires restructuring of the existing social security system, which was established chiefly for the wage workers in the industrial economy. However, while economic activities within the digital platform markets are different from industrial labour, there is still a lack of discussion on what social problems platform workers can face and how to cope with them. As a comprehensive sketch of economic activities in platform economy, this study identifies the types of platform workers and analyses three characteristics of their economic activities - flexibility, virtuality, and connectivity. It then examines what social risks can be derived form the three characteristics. This research lastly suggests alternative social safety nets and policies to alleviates the social risks and problems that platform workers may face in the digital society.

Research on Cybersecurity Risk Management System in Smart Factory Environment (스마트팩토리 환경의 사이버보안 리스크 관리 체계 연구)

  • YoungSun Shin
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.4
    • /
    • pp.43-54
    • /
    • 2024
  • This study presented a cybersecurity risk management system in a smart factory environment. A smart factory refers to a factory that optimizes the production system and increases efficiency. However, this digitized environment is vulnerable to cyber attacks, and manufacturing companies can suffer serious damage from disruptions in production systems or information leaks. Therefore, a systematic approach to effectively managing cyber security risks is essential in smart factories. In this study, a continuous security risk management system for each stage of the smart factory was proposed along with business process-based security risk assessment. These studies will help to further improve cybersecurity risk management in smart factories. It will also play an important role in ensuring that smart factories operate safely and efficiently.

Development of Joint-Based Motion Prediction Model for Home Co-Robot Using SVM (SVM을 이용한 가정용 협력 로봇의 조인트 위치 기반 실행동작 예측 모델 개발)

  • Yoo, Sungyeob;Yoo, Dong-Yeon;Park, Ye-Seul;Lee, Jung-Won
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.12
    • /
    • pp.491-498
    • /
    • 2019
  • Digital twin is a technology that virtualizes physical objects of the real world on a computer. It is used by collecting sensor data through IoT, and using the collected data to connect physical objects and virtual objects in both directions. It has an advantage of minimizing risk by tuning an operation of virtual model through simulation and responding to varying environment by exploiting experiments in advance. Recently, artificial intelligence and machine learning technologies have been attracting attention, so that tendency to virtualize a behavior of physical objects, observe virtual models, and apply various scenarios is increasing. In particular, recognition of each robot's motion is needed to build digital twin for co-robot which is a heart of industry 4.0 factory automation. Compared with modeling based research for recognizing motion of co-robot, there are few attempts to predict motion based on sensor data. Therefore, in this paper, an experimental environment for collecting current and inertia data in co-robot to detect the motion of the robot is built, and a motion prediction model based on the collected sensor data is proposed. The proposed method classifies the co-robot's motion commands into 9 types based on joint position and uses current and inertial sensor values to predict them by accumulated learning. The data used for accumulating learning is the sensor values that are collected when the co-robot operates with margin in input parameters of the motion commands. Through this, the model is constructed to predict not only the nine movements along the same path but also the movements along the similar path. As a result of learning using SVM, the accuracy, precision, and recall factors of the model were evaluated as 97% on average.

Findings on Chest Low-Dose CT Images of Group Exposed to Inorganic Dusts (분진에 노출되었던 집단의 흉부 저선량 CT영상 소견)

  • Lee, Won-Jeong;Seon, Jong-Ryul;Ahn, Bong-Seon;Park, Young-Sun
    • Journal of radiological science and technology
    • /
    • v.34 no.4
    • /
    • pp.305-314
    • /
    • 2011
  • The purpose of this study was to compare the findings on the chest low-dose CT (LDCT) images between the negative and positive groups for pneumoconiosis in the group exposed to inorganic dust. From May 30, 2007 to August 31, 2008, total 328 subjects were examined by a LDCT. LDCT images were read by a chest radiologist who has much experience for reading of pneumoconiosis. All subjects were classified into two groups based on digital images after consensus reading of two radiologists according to the ILO 2000 guidelines; negative group (87, 26.5%) without pneumoconiosis and positive group (241, 73.5%). Statistical analysis was performed using a SPSS 14.0. There were significant differences in age (60.9 vs. 65.0, p<0.001), and in dust expose duration (17.0 vs. 19.2, p=0.024) between two groups, but no significant difference in smoking (p=0.784). Of the 328 subjects, 13 diagnosis were extracted from 245 subjects (74.7%). Coronary artery calcification (CAC) was significantly higher in positive group than that in negative group (36.9% vs. 25.3%, p=0.049). Honeycombing showed higher frequency in positive group than in negative group (6.2% vs. 1.2%, p=0.079). Pneumoconiosis findings caused by inorganic dusts exposure showed the significant relation with CAC on LDCT images. Future studies need to prove that pneumoconiosis finding is independent risk factor for CAC using a coronary artery angiography.