• Title/Summary/Keyword: 산업정보화

Search Result 2,540, Processing Time 0.027 seconds

In about Solution for Improvement in the Private Security Sector research (민간경비 구성요인에 따른 개선방안에 관한 연구)

  • Lee, Young-Oh
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.265-282
    • /
    • 2008
  • This research aims to provide a solution for the improvement of private security according to the change in criminal environment. The main cause of crime can be found in the anti-functional dimensions including value set disorder, social phenomenon variation, information-based, globalization and urbanization. In this environment, the private security sector has dramatically increased in a quantitative viewpoint, but it is insufficient in a qualitative viewpoint. This paper recognized this problem and demonstrates a solution for improvement through classifying elements of private security into relevant legislation, education institutions, security companies and security associations. The analysis result is a follows: First, motivation and satisfaction rate of escort and security related major has shown to be high. However, respondents evaluated the guard educational institution negatively. Second, the motivation of entering into the private security sector for internal staffs has shown to be positive and sound. However, the job satisfaction rate has shown to be low due to excessive competition, negative perception of occupation and low earning. Third, respondents gave an average mark to the Security Association's management and operation. In addition, the mutual-aid project received the same mark. Negative feedbacks were given to the protection of member's interest and to association operation and policy, while positive feedbacks were given to the degree of member's cooperation towards association policies.

  • PDF

An Exploratory Study on the Sharing and Application of Public Open Big Data (공공 빅데이터 개방 및 활용 활성화 방안에 대한 연구)

  • Jeon, Byeong-Jin;Kim, Hee-Woong
    • Informatization Policy
    • /
    • v.24 no.3
    • /
    • pp.27-41
    • /
    • 2017
  • With the growing interest in the 4th industrial revolution and big data, various policies are being developed for facilitating the use of public open big data, which are leading to a wide range of added values created from use of such data. Despite the expanded requirements for public data disclosure and the legal system improvement, however, the use of public open big data is still limited. According to the literature review, there are studies on policy proposals for the government guiding directions for public open big data, but there is a lack of studies that handle the issue from the users' viewpoint. Therefore, this study aims to analyze the public open data ecosystem in Korea and to analyze public open big data through interviews with the providers (the government and public institutions) and users (private sector companies and citizens). This way, the study finds inhibition factors and facilitation factors, draws out issues and suggests solutions through a causal relationship analysis between each factor. Being a research on finding measures for facilitating both public big data release and use, this study has theoretical implications. In the meanwhile, the derived issues and alternatives provide practical implications also for stakeholders who are planning to facilitate release and use of public open big data.

The Ethical Regime and Technological Citizenship in Software Oriented Society (SW(소프트웨어)중심사회의 윤리적 체제와 기술 시티즌십)

  • Kim, Seungeun;Kim, Hyomin
    • Journal of Science and Technology Studies
    • /
    • v.15 no.2
    • /
    • pp.263-301
    • /
    • 2015
  • Digital inclusion is the ability or opportunities of individuals and groups to access and use information technology (IT). Digital inclusion strategies aims to ensure that all citizens regardless of their gender, race and class benefit from IT. Discourse of digital inclusion is notable in that it proposes a desirable relationship between the state, individuals, and the market within the shifting topology of technoscience. Throughout broad discourse analysis of media coverages, in-depth interviews and reports on Korean IT industry, this research argues that dialogues on digital inclusion have substantially influenced the formation of a specific ethical regime. In this regime, individuals should become subjects embodying IT expertise and acceptable codes of conducts. We further discuss that such government-driven ethical regime conflicts with technological citizenship practiced by IT experts and semi-experts. We make theoretical contribution to STS by expanding the concept of technological citizenship to include the rights and obligations of heterogeneous expert and semi-expert groups to form, propose and socially demand alternative developmental pathways of technoscience. We also note that, amid the conflict between ethical regime and technological citizenship, alternative interpretations of gender gap can be forged, providing competing perspectives on women's under-representation and labor conditions in the IT industry. Further research is required to capture the emergence of multiple identities--differentiated by gender, race, class, and more--within the clashing interface between the ethical regime and technological citizenship.

Characteristic and Accuracy Analysis of Digital Elevation Data for 3D Spatial Modeling (3차원 공간 모델링을 위한 수치고도자료의 특징 및 정확도 분석)

  • Lee, Keun-Wang;Park, Joon-Kyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.744-749
    • /
    • 2018
  • Informatization and visualization technology for real space is a key technology for construction of geospatial information. Three-dimensional (3D) modeling is a method of constructing geospatial information from data measured by various methods. The 3D laser scanner has been mainly used as a method for acquiring digital elevation data. On the other hand, the unmanned aerial vehicle (UAV), which has been attracting attention as a promising technology of the fourth industrial revolution, has been evaluated as a technology for obtaining fast geospatial information, and various studies are being carried out. However, there is a lack of evaluation on the quantitative work efficiency and data accuracy of the data construction technology for 3D geospatial modeling. In this study, various analyses were carried out on the characteristics, work processes, and accuracy of point cloud data acquired by a 3D laser scanner and an unmanned aerial vehicle. The 3D laser scanner and UAV were used to generate digital elevation data of the study area, and the characteristics were analyzed. Through evaluation of the accuracy, it was confirmed that digital elevation data from a 3D laser scanner and UAV show accuracy within a 10 cm maximum, and it is suggested that it can be used for spatial information construction. In the future, collecting 3D elevation data from a 3D laser scanner and UAV is expected to be utilized as an efficient geospatial information-construction method.

Detecting and Avoiding Dangerous Area for UAVs Using Public Big Data (공공 빅데이터를 이용한 UAV 위험구역검출 및 회피방법)

  • Park, Kyung Seok;Kim, Min Jun;Kim, Sung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.243-250
    • /
    • 2019
  • Because of a moving UAV has a lot of potential/kinetic energy, if the UAV falls to the ground, it may have a lot of impact. Because this can lead to human casualities, in this paper, the population density area on the UAV flight path is defined as a dangerous area. The conventional UAV path flight was a passive form in which a UAV moved in accordance with a path preset by a user before the flight. Some UAVs include safety features such as a obstacle avoidance system during flight. Still, it is difficult to respond to changes in the real-time flight environment. Using public Big Data for UAV path flight can improve response to real-time flight environment changes by enabling detection of dangerous areas and avoidance of the areas. Therefore, in this paper, we propose a method to detect and avoid dangerous areas for UAVs by utilizing the Big Data collected in real-time. If the routh is designated according to the destination by the proposed method, the dangerous area is determined in real-time and the flight is made to the optimal bypass path. In further research, we will study ways to increase the quality satisfaction of the images acquired by flying under the avoidance flight plan.

Implementation of A Security Token System using Fingerprint Verification (지문 인증을 이용한 보안 토큰 시스템 구현)

  • 문대성;길연희;안도성;반성범;정용화;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.63-70
    • /
    • 2003
  • In the modern electronic world, the authentication of a person is an important task in many areas of online-transactions. Using biometrics to authenticate a person's identity has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. To gain maximum security in the verification system using biometrics, the computation of the verification as well as the store of the biometric pattern has to be taken place in the security token(smart card, USB token). However, there is an open issue of integrating biometrics into the security token because of its limited resources(memory space, processing power). In this paper, we describe our implementation of the USB security token system having 206MHz StrongARM CPU, 16MBytes flash memory, and 1MBytes RAM. Also, we evaluate the performance of a light-weighted In-gerprint verification algorithm that can be executed in the restricted environments. Based on experimental results, we confirmed that the RAM requirement of the proposed algorithm was about 6.8 KBytes and the Equal Error Rate(EER) was 1.7%.

A Curriculum Study to Strengthen AI and Data Science Job Competency (AI·데이터 사이언스 분야 직무 역량 강화를 위한 커리큘럼 연구)

  • Kim, Hyo-Jung;Kim, Hee-Woong
    • Informatization Policy
    • /
    • v.28 no.2
    • /
    • pp.34-56
    • /
    • 2021
  • According to the Fourth Industrial Revolution, demand for and interest in jobs in the field of AI and data science - such as artificial intelligence/data analysts - are increasing. In order to keep pace with this trend, and to supply human resources that can effectively perform such jobs in the relevant fields in a timely manner, job seekers must develop the competencies required by the companies, and universities must be in charge of training. However, it is difficult to devise appropriate response strategies at the level of job seekers, companies and universities, which are stakeholders in terms of supplying suitably competent personnel. Therefore, the purpose of this study is to determine which competencies are required in practice in order to cultivate and supply human talents equipped with the necessary job competencies, and to propose plans for the development of the required competencies at the university level. In order to identify the required competencies in the field of AI and data science, data on job postings on the LinkedIn site, the recruitment platform, were analyzed using text mining techniques. Then, research was conducted with the aim of devising and proposing concrete plans for competency development at the university level by comparing and verifying the results of the international graduate school curriculum in the field of AI and data science, and the interview results with the hiring managers, respectively, with the results of the topic model.

Evaluating the Efficiency of Personal Information Protection Activities in a Private Company: Using Stochastic Frontier Analysis (개인정보처리자의 개인정보보호 활동 효율성 분석: 확률변경분석을 활용하여)

  • Jang, Chul-Ho;Cha, Yun-Ho;Yang, Hyo-Jin
    • Informatization Policy
    • /
    • v.28 no.4
    • /
    • pp.76-92
    • /
    • 2021
  • The value of personal information is increasing with the digital transformation of the 4th Industrial Revolution. The purpose of this study is to analyze the efficiency of personal information protection efforts of 2,000 private companies. It uses a stochastic frontier approach (SFA), a parametric estimation method that measures the absolute efficiency of protective activities. In particular, the personal information activity index is used as an output variable for efficiency analysis, with the personal information protection budget and number of personnel utilized as input variables. As a result of the analysis, efficiency is found to range from a minimum of 0.466 to a maximum of 0.949, and overall average efficiency is 0.818 (81.8%). The main causes of inefficiency include non-fulfillment of personal information management measures, lack of system for promoting personal information protection education, and non-fulfillment of obligations related to CCTV. Policy support is needed to implement safety measures and perform personal information encryption, especially customized support for small and medium-sized enterprises.

A Study on the Method of Constructive Simulation Operation Analysis for Warfighting Experiment Supplied with the Validation Evaluation (타당성 평가가 보완된 모델 운용상의 전투실험 모의분석 절차 연구)

  • Park, Jin-Woo;Kim, Nung-Jin;Kang, Sung-Jin;Soo, Hyuk
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.77-87
    • /
    • 2010
  • Currently, our society has been changed from the industrial society to the information society. As the war progresses to Information Warfare, Network-Centric Warfare, Long-Range Precision Engagement and Robot Warfare, the military should advance to High-tech Scientific force. For this creation of the war potential, it is regarded as the warfighting experiment is a critical method. Surely it is rational that LVC(Live Virtual Constructive simulation) is desirable to make the warfighting experiment. But because it is limited by the cost, the time, the place and the resource, the constructive simulation(M&S : Modeling&Simulation) is a good tool to solve those problems. There are some studies about the evaluation process for developing the model, but it is unsatisfying in the process of the constructive simulations' operation. This study focuses on the way of constructive simulation operation, which is supplied with the evaluation process(VV&A : Verification Validation & Accreditation). We introduce the example of the rear area operation simulation for "appropriateness evaluation to the organization of logistic corps" by the AWAM(Army Weapon Analysis Model). This study presents the effective methods of the constructive simulations, which is based on the reliable evaluation process, so it will contribute to the warfighting experiments.

A Study of Activation Approaches by the on the Analysis Problems and Success Cases of Traditional Markets (재래시장의 문제점과 사례 분석을 통한 활성화 방안)

  • Lee, Jae-Han;Kim, Kyu-Won;Yu, Jong-Pil
    • The Korean Journal of Franchise Management
    • /
    • v.1 no.1
    • /
    • pp.19-42
    • /
    • 2010
  • Since circulation market whole surface opening, traditional market is real condition that is looked away more gradually to consumer as reasons of international retail firms and domestic enterprise firms to enter distribution industry, internet mail order rapid increase by information-oriented society, the pursuit of upgradation and normalization by elevation of income level and consumption pattern change that consideration convenience with young consumers as the central figure. Therefore, the purpose of this study is to analyze stagnation cause of traditional market and problem within a change of new distribution environment, and to develop new approaches for dealing with domestic traditional market relationship prompting competition through activation example analysis of foreign traditional market and domestic traditional market. The result of the study indicated that there are a lot of cases that are begun by a few's merchant with leadership that has been will which is strong in activation in beginning in market's occasion that succeed in activation. In particular, software side such as operational efficiency or marketing expertise strengthening of management is that effect is high relatively than hardware side market activation. Also essential to the settlement of credit transactions using credit cards is important for expanding the effort, for the expansion of credit card merchant credit card advantage and raise awareness among traders about the expected effects is needed. Though these study finding submits plan that create market ecosystem so that many consumers may become place that could visit naturally and create pleasure and convenience, and time, monetary, psychological value of shopping to traditional market, there is sense.