Trusted Computing is a hardware-based technology that aims to guarantee security for machines beyond their users' control by providing security on computing hardware and software. TPM(Trusted Platform Module), the trusted platform specified by the Trusted Computing Group, acts as the roots for the trusted data storage and the trusted reporting of platform configuration. Data sealing encrypts secret data with a key and the platform's configuration at the time of encryption. In contrast to the traditional data sealing based on binary hash values of the platform configuration, a new approach called property-based data sealing was recently suggested. In this paper, we propose and analyze a new property-based data sealing protocol using the weakest precondition concept by Dijkstra. The proposed protocol resolves the problem of system updates by allowing sealed data to be unsealed at any configuration providing the required property. It assumes practically implementable trusted third parties only and protects platform's privacy when communicating. We demonstrate the proposed protocol's operability with any TPM chip by implementing and running the protocol on a software TPM emulator by Strasser. The proposed scheme can be deployed in PDAs and smart phones over wireless mobile networks as well as desktop PCs.
Using data from the Korean Labor & Income Panel Study (KLIPS), this study investigates private income transfers in Korea, where adult children have undertaken the most responsibility of supporting their elderly parents without well-established social safety net for the elderly. According to the KLIPS data, three out of five households provided some type of support for their aged parents and two out of five households of the elderly received financial support from their adult children on a regular base. However, the private income transfers in Korea are not enough to alleviate the impact of the fall in the earned income of those who retired and are approaching an age of needing financial assistance from external source. The monthly income of those at least the age of 75, even with the earning of their spouses, is below the staggering amount of 450,000 won, which indicates that the elderly in Korea are at high risk of poverty. In order to analyze microeconomic factors affecting the private income transfers to the elderly parents, the following three samples extracted from the KLIPS data are used: a sample of respondents of age 50 or older with detailed information on their financial status; a five-year household panel sample in which their unobserved family-specific and time-invariant characteristics can be controlled by the fixed-effects model; and a sample of the younger split-off household in which characteristics of both the elderly household and their adult children household can be controlled simultaneously. The results of estimating private income transfer models using these samples can be summarized as follows. First, the dominant motive lies on the children-to-parent altruistic relationship. Additionally, another is based on exchange motive, which is paid to the elderly parents who take care of their grandchildren. Second, the amount of private income transfers has negative correlation with the income of the elderly parents, while being positively correlated with the income of the adult children. However, its income elasticity is not that high. Third, the amount of private income transfers shows a pattern of reaching the highest level when the elderly parents are in the age of 75 years old, following a decreasing pattern thereafter. Fourth, public assistance, such as the National Basic Livelihood Security benefit, appears to crowd out private transfers. Private transfers have fared better than public transfers in alleviating elderly poverty, but the role of public transfers has been increasing rapidly since the welfare expansion after the financial crisis in the late 1990s, so that one of four elderly people depends on public transfers as their main income source in 2003. As of the same year, however, there existed and occupied 12% of the elderly households those who seemed eligible for the National Basic Livelihood benefit but did not receive any public assistance. To remove elderly poverty, government may need to improve welfare delivery system as well as to increase welfare budget for the poor. In the face of persistent elderly poverty and increasing demand for public support for the elderly, which will lead to increasing government debt, welfare policy needs targeting toward the neediest rather than expanding universal benefits that have less effect of income redistribution and heavier cost. Identifying every disadvantaged elderly in dire need for economic support and providing them with the basic livelihood security would be the most important and imminent responsibility that we all should assume to prepare for the growing aged population, and this also should accompany measures to utilize the elderly workforce with enough capability and strong will to work.
Innovation is the development of new customers value through solutions that meet new needs, inarticulate needs, or old customer and market needs in value adding new ways. This is accomplished through more effective products, processes, services, technologies, or ideas that are readily available to markets, governments, and society. Innovation differs from invention in that innovation refers to the use of a better and, as a result, novel idea or method, whereas invention refers more directly to the creation of the idea or method itself. Therefore, the utilization of patents is the most important of the three aspects (creation, protection and utilization) in the patent system for getting to actual innovation. In order to increase the patent use, the rates of the applied patents to a real industrial process and the bargain and license of patent rights should be promoted. For promoting technological innovation substantially, there is necessary to escape from dichotomy of weakening or enhancing patent protection in the discussion on the changes of patent system for "Adequate patent guarantees". Furthermore, the legal and institutional improvements to enable the use of patent should be discussed together. Recently, open innovation is a new paradigm that assumes that firms can and should use external ideas as well as internal ideas, and internal and external paths to market, as the firms look to advance their technology" or "Innovating with partners by sharing risk and sharing reward." The boundaries between a firm and its environment have become more permeable; innovations can easily transfer inward and outward. The central idea behind open innovation is that in a world of widely distributed knowledge, companies cannot afford to rely entirely on their own research, but should instead buy or license processes or inventions (i.e. patents) from other companies. In addition, internal inventions not being used in a firm's business should be taken outside the company. In the era of open innovation, more flexible patent use strategy is essential. It is important that improvements for the legal system in order that patented technology can be applied for products and processes in a real industrial between outside and inside of the firms.
The Journal of the Korea institute of electronic communication sciences
/
v.7
no.4
/
pp.693-705
/
2012
It is increasing the necessity of technology cooperation between nations, in the world, more and more. The international cooperation for the technology development have the dissipating effect of costs and risks and encourage efficient use of the knowledge and eventually help the firms better access overseas market easily. The S&T diplomacy of Korea is, at present, on international S&T cooperation to secure technologies to strengthen base of science, technology and innovation. This tendency is closely related with the governance issue in international S&T cooperation. And This international S&T cooperation is connected with the internationalization of firms. But it is getting more difficult for a firm, especially smaller firm like Korean SME to sustain the technological advantage over any significant period. The small and medium sized enterprises as Korean SME, internationalization of R&D is difficult just to think in terms of one framework with the limited accumulation of informations and experiences. So against that situation, this paper shows a new concept 'SME co-ordinator' as the role client(or player) reinforcing international S&T cooperation, sustaining the technological advantage for Korean SME. And 'SME co-ordinator' leads Korean SME to progress 'open innovation' not 'close innovation' as well as serving adequate information about appropriate partners and capable employer to help manage the international S&T cooperation for Internationalization of Industrial R&D for Korean SME.
This study evaluated the actual status of special needs of the hearing-impaired person for disaster response. The analysis revealed a significant level of unmet needs in disaster response for hearing-impaired person. The 5 special needs in disaster response include: 1) communication needs, which involve securing the means to make an emergency rescue request and communicating information during the rescue process; 2) transportation needs, which indicate the effective evacuation capacity and the level of training; 3) medical needs, which address the degree of preparedness for physical and mental emergency measures and the delivery of health information for rescue and first aid process; 4) maintaining functional independence needs, which refer to the level of self-preparedness to minimize damage in disaster situations, and; 5) supervision needs, which correspond to a personalized support system provided to disaster-vulnerable groups.
Asia-Pacific Journal of Business Venturing and Entrepreneurship
/
v.10
no.1
/
pp.13-21
/
2015
To determine the effect of employment stability by business incubator manager on the service level and management performance by new businesses, the survey of 215 businesses at 50 business incubator centers over the country was conducted. This study is to confirm that employment stability by business incubator manager is one of significant variables to support growth of new businesses. As a result of study, with respect to the effect of employment stability by business incubator manager on the supportive service level and management performance by new businesses, the group with higher employment stability by manager revealed statistically more significant effect than the group with less did, and the group with higher employment stability showed higher manager performance as well. Furthermore, as a result of analyzing the relationship between supportive service level and management performance and performance by manager, as performance by manager is higher, the service satisfaction and management performance by new businesses were higher. This indicates that to support successful new business by the business incubator, the center shall ensure employment stability of a manager to establish the condition of stable support for new businesses, and that through enhancement of professionalism by a manager, the foundation to support growth of new businesses shall be prepared as well.
Recently, there has been an explosive increase in the volume of multimedia data that is available as a result of the development of multimedia technologies. More and more data is becoming available on a variety of web sites, and it has become increasingly cost prohibitive to have a single data server store and process multimedia files locally. Therefore, many service providers have been likely to outsource data to cloud storage to reduce costs. Such behavior raises one serious concern: how can data users be authenticated in a secure and efficient way? The most widely used password-based authentication methods suffer from numerous disadvantages in terms of security. Multi-factor authentication protocols based on a variety of communication channels, such as SMS, biometric, or hardware tokens, may improve security but inevitably reduce usability. To this end, we present a data block-based authentication scheme that is secure and guarantees usability in such a manner where users do nothing more than enter a password. In addition, the proposed scheme can be effectively used to revoke user rights. To the best of our knowledge, our scheme is the first data block-based authentication scheme for outsourced data that is proven to be secure without degradation in usability. An experiment was conducted using the Amazon EC2 cloud service, and the results show that the proposed scheme guarantees a nearly constant time for user authentication.
The Journal of the Convergence on Culture Technology
/
v.8
no.5
/
pp.561-568
/
2022
The purpose of this study is to explore the narrative of VR disaster and safety Education introduced by disaster film narrative. VR(Virtual Reality) is be suitable technology for disaster and safety Education due to media characteristics as 'immersion', 'presence', 'interactivity', 'pleasure'. Disaster film narrative is able to be worth VR disaster and safety education as a variety of stories and educational effect. For this study, examine a theoretical study and a visiting research of 'Busan 119 Safety & Experience Center'. This study concludes that Firstly need to introduce catharsis effect, Secondly, build 'interactive narratives' that ensure active participation of users, Thirdly, introduce an 'adventure game' narrative element, Fourthly, introduce a hero-shaped narrative in which the user becomes a one-man hero, And lastly, need education as use user's multiple access and group experience learning. Therefore, This thesis is of academic value in that it suggest a desirable new direction of narrative in VR disaster and safety education.
Background: The advancement of information and communication technology acts as a key driver in the implementation of smart cities. Smart Public Facilities leverage this technological progress to innovate urban operations, optimizing various city functions, enhancing the quality of public services, and improving citizens' accessibility and convenience. These Smart Public Facilities are introduced for the sustainable development of cities and the enhancement of citizens' quality of life. Method: This study systematically analyzed the public design policies of local governments and examined the use cases of Smart Public Facilities domestically and internationally to evaluate their functions and roles. Through this, the effectiveness and sustainability of public design policies were comprehensively reviewed, and the impact of Smart Public Facilities on urban operations and citizens' lives was analyzed from multiple perspectives. Results: The introduction of Smart Public Facilities significantly enhances the implementation and efficiency of public design policies, playing a crucial role in sustainable urban development and improving citizens' quality of life. Furthermore, positive impacts were observed in various areas such as energy management, transportation systems, and environmental monitoring. Major challenges included managing technological changes, ensuring data privacy and cybersecurity, and strengthening citizen participation. Conclusion: Smart Public Facilities serve as essential infrastructure for improving urban efficiency, sustainability, and citizens' quality of life. Successful implementation and operation require systematic management and citizen participation. Through this, Smart Public Facilities will support sustainable urban development and play a critical role in responding to environmental changes. To ensure that Smart Public Facilities function effectively as urban infrastructure, it is necessary to comprehensively evaluate their impact on the efficiency of public design policies, sustainability, citizens' quality of life, and the local economy, and to suggest concrete measures for their introduction and operation.
The Swedish labor market secures flexibility in the use of labor force by means of non-regular workers such as temporary workers among others instead of regular workers' layoffs. Although the labor law reform in the late 2000s made it easier to use temporary workers and the outbreak of the economic crisis strengthened the power of user firms against labor unions, the size of temporary workers was scaled down. It is the aim of this study to analyze the change in the use of temporary workers, to examine the effect of the labor law reform and that of economic crisis in that regard, and to explain how, over the use of temporary workers, user firms' strategy to secure flexibility and labor unions' strategy to regulate flexibility interact with each other so as to establish a new equilibrium through conflicts and compromises. The labor law reform to enhance the flexibility in the use of temporary workers failed to entail amendments of collective contracts. Besides, out of the economic crisis, user firms adopted a new policy to use third party workers more, refraining from employing temporary workers. That's why the number of temporary workers has declined eventually. User firms prefer to use third party workers because they could avoid their own responsibility as an employer and they could rely on 'permanent temporary' workers without any time limit. Labor unions, however, responded with a strategy to lay more strict regulations on the use of third party workers, so that third party workers could be used only for limited cause for external numerical flexibility. As a result, the managed flexibility thesis comes to prevail to the usage of non-regular workers in general beyond the category of agency workers. Korea with severe abuse of third party workers should learn from Swedish labor unions' strategy to provide third party workers with stronger employment security and higher wages so as to prevent user firms from abusing third party workers.
이메일무단수집거부
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.