• Title/Summary/Keyword: 사이버 기반

Search Result 1,214, Processing Time 0.024 seconds

The Nuclear Security Summit Achievements, Limitations, and Tasks against Nuclear Terrorism Threat (핵테러리즘 위협에 대한 핵안보정상회의 성과, 한계 및 과제)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.73-81
    • /
    • 2017
  • In April 2009, in the wake of President Obama's Prague speech, the international community held four nuclear sec urity summits from 2010 to 2016 to promote nuclear security and prevent nuclear terrorism. The Nuclear Security S ummit has made significant progress in preventing terrorists from attempting to acquire nuclear weapons or fissile materials, but it still has limitations and problems. To solve this problem, the international community should resume the joint efforts for strengthening bilateral cooperation and multilateral nuclear security regime, and the participating countries should strive to protect their own nuclear materials and fulfill their commitments to secure nuclear facilitie s. Second, the United Nations(UN), the IAEA(International Atomic Energy Agency), International Criminal Police Or ganization(INTERPOL), the Global Initiative to Combat Nuclear Terrorism(GICNT), and the Global Partnership(G P) must continue their missions to promote nuclear security in accordance with the five action plans adopted at the Fourth Nuclear Security Summit. Third, the participating countries should begin discussions on the management and protection of military nuclear materials that could not be covered by the Nuclear Security Summit. Fourth, the intern ational community must strive to strengthen the implementation of the Convention on the Physical Protection of Nuc lear Material(CPPNM) Amendment and International Convention for the Suppression of Acts of Nuclear Terrori sm(ICSANT), prepare for cyber attacks against nuclear facilities, and prevent theft, illegal trading and sabotage invo lving nuclear materials.

Examining the relationship between the types of color selecting behavior and self-esteem in Mabinogi, the on-line game (마비노기에서의 색 선택 행동 유형과 자아존중감과의 관계)

  • Jang, You-Won;Doh, Young-Yim
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.651-655
    • /
    • 2007
  • 카툰 렌더링 그래픽을 기반으로 한 온라인 RPG 게임인 마비노기에서는 게임이용자들이 염색 시스템을 통하여 의복아이템에 자신들이 원하는 색을 자유롭게 표현할 수 있다. 마비노기에서 색에 관련된 주목할 만한 현상은유행색이 존재하고 색에 따라 같은 아이템의 가격이 달라진다는 점이다. 유행색이 존재하는 것은 현실과 비슷하지만 같은 아이템이 색에 따라 가격이 달라지는 것은 현실에서는 보기 드물다. 이는 현실과 비슷하면서도 심리적인 속성이 다른 사이버공간만의 특징이라고 생각해 볼 수 있다. 따라서 마비노기에서 게임이용자들이 색을 선택하고 사용할 때 작용하는 심리기제가 존재할 것이라고 가정해 볼 수 있다. 이에 본 연구에서는 마비노기에서 색 선택 행동의 심리적 유형을 확인하고 유형별 특징을 알아보기 위해 자아존중감을 측정하였다. 예비 조사를 통해 게임이용자 20명과 온라인 인터뷰를 실시하여 색 사용 경험을 추출하고, 추출한 경험을 바탕으로 18문항의 색 선택 행동 문항을 구성하였다. 본 조사에서는 온라인 설문으로 129명의 게임이용자를 대상으로 색 선택 행동과 자아존중감을 측정하였다. 연구 결과 색 선택 행동은 4개의 요인-색채 둔감성, 유행추종, 개성표현, 캐릭터이미지와의 적합성-으로 구분되었다. 색선택 행동 4개의 하위 요인을 기준으로 군집분석한 결과 색 선택 행동 유형은 각각 색 분화형, 유행추종형, 색 둔감형으로 구분되었다. 색 선택 행동 유형과 자아존중감과의 관계에서는 자아존중감 하위 범주 중 부정적인 자기평가, 타인의 의견에 대한 걱정, 의존성의 세 가지 하위 범주에서 색 선택 행동 유형에 따른 차이가 유의미하게 나타났다. 한편 자의식 차원에서는 색 선택 행동 유형간 유의미한 차이가 발견되지 않았다. 유행추종형은 다른 두 유형에 비해 상대적으로 자아존중감 수준이 낮음을 확인할 수 있었다. 반대로 색 둔감형은 다른 두 유형에 비해 상대적으로 자아 존중감 수준이 높았다. 색 분화형은 유행추종형과 색 둔감형의 중간 수준의 자아존중감을 볼 수 있었다. 유행추종형은 자기의 외부에서, 색 둔감형은 자기의 내부에서 색과 관련된 자신에 대한 가치감의 소재와 근원을 찾는 특성이 있다고 해석할 수 있다. 본 연구는 온라인 RPG 게임에서 게임이용자들의 색 선택의 심리적 기제를 확인하고 색 선택 유형별로 자아존중감과의 관계를 확인함으로써 색 선택 행동의 심리적 기제를 밝히려는 기초연구라는 점에 의의가 있다. 추후에는 게임이용자들의 색 선택 행동을 보다 포괄적으로 이해하기 위해 게임이용자들이 가지고 있는 공통적인 색이미지와 개별적인 색이미지 및 색이미지의 심리적 구조를 알아보기 위한 색채감성연구가 필요할 것이다. 이러한 연구들은 게임을 제작할 때 캐릭터 디자인과 아이템 디자인에 어떠한 색을 사용해야 되는지 방향을 설정하는데 도움을 줄 수 있을 것이다.

  • PDF

A Study on the Current Situation and Problems of Agricultural Products e-Commerce in Korea (B2B 농산물 전자상거래 활성화 방안과 과제에 관한 연구)

  • Kim, Kyu-Hyong;Lee, Moon-Seok
    • International Commerce and Information Review
    • /
    • v.13 no.1
    • /
    • pp.29-52
    • /
    • 2011
  • A predictable and manageable output is desirable for most businesses. However, it is very difficult to control the quality and quantity of products in the food and agriculture business. Predictable outputs help managers plan their marketing, sales, and inbound and outbound logistics, but these are not easy to achieve in the food and agriculture business. Various industries have adopted different levels of automation and utilization of information systems for quality/quantity control; however e-Commerce of the food and agriculture industry is far behind those of other industries. Today, the food and agriculture industry is supposed to be more integrated than ever in order to reduce risks and improve processing costs, from farm to table. Since its operations including production, processing, storage, distribution, and management are dispersed all over the world, the food and agricultural industries now depend more on IT than other industries. This study attempts to develop a framework to analyze the current situation of agricultural product e-Commerce in Korea, and finds out the actual situation of the farmers operating on-line shopping systems through the developed framework and suggests some improvements.

  • PDF

멀티미디어 정보시스템을 이용한 기업체 교육의 효과요인 도출을 위한 실증적 연구

  • 김병곤;이동만;박순창
    • Proceedings of the CALSEC Conference
    • /
    • 1999.11a
    • /
    • pp.280-293
    • /
    • 1999
  • 본 연구는 경영학 관련 분야에서 멀티미디어 기술의 경영학적 측면의 응용에 관한 연구의 중요성이나 필요성을 많은 학자들이 인식하고 있음에도 불구하고 아직 멀티미디어에 관한 연구가 전무한 실정에서 시도한 초기연구라는데 연구의 의의가 있다. 이러한 시점에서 교육공학과 경영정보학을 접목시킨 멀티미디어에 관한 연구는 상당히 중요할 것으로 판단된다. 이와 같이 본 연구는 경영정보학 분야에서 멀미미디어에 관한 연구로서는 초기의 연구로서, 본 연구가 가지는 연구의 필요성이나 중요성에 대해서는 우리들이 충분히 인식할 수 있을 것이다. 지금까지 국내외적으로 멀티미디어 정보시스템을 이용한 교육의 효과에 관한 연구는 몇 편의 탐색적 논문이 발견되고 있으나, 멀티미디어를 이용한 교육의 효과를 구성하는 요인이 무엇인지를 밝히기 위한 연구는 거의 전무한 실정이다 이러한 상황에서 멀티미디어를 이용한 교육의 효과를 구성하는 요인이 무엇이며, 구성요인 중 어떤 요인이 기업이나 학습자에게 가장 큰 효과를 가져다주는지를 밝히기 위한 연구는 현실적으로 상당히 중요하며 의미 있는 연구로 받아들여진다. 본 연구는 멀티미디어 정보시스템을 이용한 기업체 교육훈련의 효과요인을 도출하기 위하여 문헌연구와 실증적 연구를 병행 수행하였다. 우선 멀티미디어 정보시스템에 관한 문헌연구를 통하여 멀티미디어를 이용한 교육의 22가지 효과항목을 도출하였다. 다음으로 멀티미디어 정보시스템을 갖추고 있는 국내 5대 재벌 그룹연수원의 멀티미디어 교육실에서 교육을 받은 517명의 기업체 사원들을 대상으로 약 2개월간 설문조사를 실시하여 자료를 수집하고, 통계분석 패키지를 이용하여 자료를 분석하였다. 방식을 결합한 하이브리드 형태이다.인터넷으로 주문처리하고, 신속 안전한 배달을 기대한다. 더불어 고객은 현재 자신의 물건이 배달되는 경로를 알고싶어 한다. 웹을 통해 물건을 주문한 고객이 자신이 물건의 배달 상황을 웹에서 모니터링 한다면 기업은 고객으로 공간적인 제약으로 인한 불신을 불식시키는 신뢰감을 주게 된다. 이러한 고객서비스 향상과 물류비용 절감은 사이버 쇼핑몰이 전국 어디서나 우리의 안방에서 자연스럽게 점할 수 있는 상황을 만들 것이다.SP가 도입되어, 설계업무를 지원하기위한 기본적인 시스템 구조를 구상하게 된다. 이와 함께 IT Model을 구성하게 되는데, 객체지향적 접근 방법으로 Model을 생성하고 UML(Unified Modeling Language)을 Tool로 사용한다. 단계 4)는 Software Engineering 관점으로 접근한다. 이는 최종산물이라고 볼 수 있는 설계업무 지원 시스템을 Design하는 과정으로, 시스템에 사용될 데이터를 Design하는 과정과, 데이터를 기반으로 한 기능을 Design하는 과정으로 나눈다. 이를 통해 생성된 Model에 따라 최종적으로 Coding을 통하여 실제 시스템을 구축하게 된다.the making. program and policy decision making, The objectives of the study are to develop the methodology of modeling the socioeconomic evaluation, and build up the practical socioeconomic evaluation model of the HAN projec

  • PDF

Expand public interest of Private Security activities (민간경비 활동의 공익성 확대 논의)

  • Gong, Bae Wan;Park, Yong Soo
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.3-10
    • /
    • 2014
  • Private security organizations are complementary to the national safety of life and property of individuals as a social role to play in maintaining peace and order. Pursuit of profit is to the public practice according to the logic of capitalist markets and customers seeking to protect the lives and property. However, the legal and institutional constraints of private security is being requirements inhibited by the development. Crime prevention as a private security role that the private companies, which will pursue the public interest. After all, the expansion of the private security crime is results in an increase in unit. The current level of private security in the 1970s remain, and the constraints is being under goodwill and expertise outside of the training system on the market. Variety of crimes, including cyber crime increases and considering the reality of the constraints on private security requirements are able to improve or supplement shall be realistic. In particular, the legal, regulatory and institutional factors must be improved, with goodwill, and for the creation of new industrial policy as a complement to the public interest should be also provided. The private security law interests through integration of private security guards should be guaranteed, and the term of the theorem, sales activities, ensuring the training of professional staff with professional qualifications system is to be settled. As a private security guard industry growth and development can be based on this composition.

A Fundamental Study on the Development of the Fusion Education Curriculum in the Field of Architecture and Urban: based on Practitioner-oriented Survey (건축·도시 분야 융복합 교육과정 개발을 위한 기초연구 -실무자 중심의 설문조사를 기반으로-)

  • Hong, So-Hee;Yoo, Seung-Kyu;Yuh, Ok-Kyung;Kim, Jae-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3491-3498
    • /
    • 2015
  • The purpose of this study is to identify demand of fusion education in the field of architecture and urban, according to architecture and urban market changing, product changing, increasing fusion education demand. We conducted online surveys targeting construction and non construction field practitioners so that we want to identify consumer's needs about fusion education in the field of architecture and urban. Research findings can be summarized in three parts. First, practitioners need to fuse business-related majors (Frequency changing ratio : financing(716.7%), management(633.3%), planning(454.5%) etc.) and traditional majors. Second, the survey results show that 79 percent of those questioned were in favor of switching the cyber and off-line operation methods for fusion education. They require the complementary education system between off-line and cyber education based on education accessability. Third, the survey results show that 70.9 percent of those questioned were in favor of limited freestyle(Freedom of choices without required subjects). The curriculum should be arranged according to the flow of construction business process including fusion subjects.

Establishment of Korea National Counter-terrorism System and Development Plan (국가대테러체제의 구축 및 발전방안)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.229-249
    • /
    • 2015
  • As the post-cold war era and globalization go on, national security problems which were not traditional national security problems such as terrorism, crime, environmental disasters, economic crises, cyber-terrorism, diseases, and energy problems threat humanity and nations and demands changes. Also, with the change, the concept of "big government" has emerged as the role of nation expanded. The modern society sees every country change from small government to big government in order to realize the establishment of welfare state. A comprehensive interpretation of security is needed in order to comprehensive protection of citizens beyond outside invasion such as crime, new disaster, terrorism. In Korea, incidents such as Cheonan-Ham, Yeonpeyong-Do, foot-and-mouth disease, Ddos terrorism, pirates hostages, mad cow disease, AI are happening and the humanitarian support for North Korea and the summit of South and North Korea are at a standstill. Also, National emergency management system, comprehensive emergency management center, countrol tower, national security system, cooperation with citizens, establishment of legal and institutional system are needed. The importance of this research is on the reestablishment of new national security and emergency management system according to the comparison between the national security and counter-terrorism system of Korea and that of the United States which is a leading country in this field. Also, the establishment of national emergency management act is needed as a statute for effective function as currently various laws and administrative organizations are dispersed.

  • PDF

A Study on the Vulnerability Management of Internet Connection Devices based on Internet-Wide Scan (인터넷 와이드 스캔 기술 기반 인터넷 연결 디바이스의 취약점 관리 구조 연구)

  • Kim, Taeeun;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.504-509
    • /
    • 2019
  • Recently, both wireless communications technology and the performance of small devices have developed exponentially, while the number of services using various types of Internet of Things (IoT) devices has also massively increased in line with the ongoing technological and environmental changes. Furthermore, ever more devices that were previously used in the offline environment-including small-size sensors and CCTV-are being connected to the Internet due to the huge increase in IoT services. However, many IoT devices are not equipped with security functions, and use vulnerable open source software as it is. In addition, conventional network equipment, such as switches and gateways, operates with vulnerabilities, because users tend not to update the equipment on a regular basis. Recently, the simple vulnerability of IoT devices has been exploited through the distributed denial of service (DDoS) from attackers creating a large number of botnets. This paper proposes a system that is capable of identifying Internet-connected devices quickly, analyzing and managing the vulnerability of such devices using Internet-wide scan technology. In addition, the vulnerability analysis rate of the proposed technology was verified through collected banner information. In the future, the company plans to automate and upgrade the proposed system so that it can be used as a technology to prevent cyber attacks.

Functional Health Status and Medical Service Utilization Pattern of General and Vulnerable Older People in Community (지역사회 일반 및 취약계층 노인의 건강기능상태와 의료서비스 이용 행태)

  • Oh, Doonam;Jeong, Hyoseon;Hwang, Jeonghae
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.404-414
    • /
    • 2021
  • This study was to investigate the differences of functional health status and medical service experience and needs between general and vulnerable older people in community. This study is a cross-sectional descriptive research. The data obtained through direct visit surveys from November to December 2016. The target population of the study was older people over 65 years old, the final study subjects were 444 older people residing in one district of Seoul. The chi-square test was conducted to confirm the difference in their functional health areas and medical service experiences, and the necessity of medical service utilization in accordance to the social class. In the experience of abnormality in functional health, the vulnerable older people had higher experience in cognitive function, nutrition, hydration, pain, and falling than the general older people. The rate of experience of using medical service to solve the cognitive function problem for general older people was 31.9%, higher than that of the vulnerable older people. In contrast, the medical service utilization needs of the vulnerable older people in the pain management category was significantly higher than that of the general older people. In setting policy of public medical service programs for general and vulnerable older people in community may be differentially developed based on this study. In order to improve the medical accessibility of the vulnerable older people, public medical institutions should be actively supported to overcome obstacles to medical use due to economic barriers.

Development of Cloud-Based Medical Image Labeling System and It's Quantitative Analysis of Sarcopenia (클라우드기반 의료영상 라벨링 시스템 개발 및 근감소증 정량 분석)

  • Lee, Chung-Sub;Lim, Dong-Wook;Kim, Ji-Eon;Noh, Si-Hyeong;Yu, Yeong-Ju;Kim, Tae-Hoon;Yoon, Kwon-Ha;Jeong, Chang-Won
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.7
    • /
    • pp.233-240
    • /
    • 2022
  • Most of the recent AI researches has focused on developing AI models. However, recently, artificial intelligence research has gradually changed from model-centric to data-centric, and the importance of learning data is getting a lot of attention based on this trend. However, it takes a lot of time and effort because the preparation of learning data takes up a significant part of the entire process, and the generation of labeling data also differs depending on the purpose of development. Therefore, it is need to develop a tool with various labeling functions to solve the existing unmetneeds. In this paper, we describe a labeling system for creating precise and fast labeling data of medical images. To implement this, a semi-automatic method using Back Projection, Grabcut techniques and an automatic method predicted through a machine learning model were implemented. We not only showed the advantage of running time for the generation of labeling data of the proposed system, but also showed superiority through comparative evaluation of accuracy. In addition, by analyzing the image data set of about 1,000 patients, meaningful diagnostic indexes were presented for men and women in the diagnosis of sarcopenia.