• Title/Summary/Keyword: 서비스 제공 수준

Search Result 1,749, Processing Time 0.027 seconds

Influence of Weed Management Practices on Ground-dwelling Arthropod Assemblages in Organic and Conventional Apple Orchards (유기재배와 관행재배 사과원 내 지표 배회성 절지동물 군집에 대한 잡초 관리의 영향)

  • Kim, Jiwon;Jung, Chuleui
    • Korean journal of applied entomology
    • /
    • v.60 no.1
    • /
    • pp.105-114
    • /
    • 2021
  • Ground-dwelling arthropods are important components in apple orchard providing beneficial ecological services of predation and decomposition as well as herbivory. Groundcovers are managed differentially in organic and conventional apple orchards influencing ground-dwelling arthropod assemblages. We conducted 3-year studies to assess the effects of orchard management relative to weed management on the abundance and diversity of ground-dwelling arthropods using pitfall trapping. Most arthropods were classified as higher taxonomical groups and functional feeding guilds, while carabid beetles were classified into species level. Coleoptera was the dominating taxon of all ground-dwelling arthropods. Abundance of herbivores and predators was significantly higher in organic apple orchards than conventional ones. Higher abundance and diversity of carabid beetles were found in organic orchards than in conventional orchards. The abundance of Araneae, Coleoptera, or carabid beetles was negatively correlated to weed management frequency. It was found that ground-dwelling arthropods were more influenced by weed management practices than the farming systems.

Periodic-and-on-Event Message-Aware Automotive Intrusion Detection System (Periodic-and-on-Event 메시지 분석이 가능한 차량용 침입탐지 기술)

  • Lee, Seyoung;Choi, Wonsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.373-385
    • /
    • 2021
  • To provide convenience and safety of drivers, the recent vehicles are being equipped with a number of electronic control units (ECUs). Multiple ECUs construct a network inside a vehicle to share information related to the vehicle's status; in addition, the CAN protocol is normally applied. As the modern vehicles provide highly convenient and safe services, it provides many types of attack surfaces; as a result, it makes them vulnerable to cyber attacks. The automotive IDS (Intrusion Detection System) is one of the promising techniques for securing vehicles. However, the existing methods for automotive IDS are able to analyze only periodic messages. If someone attacks on non-periodic messages, the existing methods are not able to properly detect the intrusion. In this paper, we present a method to detect intrusions including an attack using non-periodic messages. Moreover, we evaluate our method on the real vehicles, where we show that our method has 0% of FPR and 0% of FNR under our attack model.

Big Data and Personal Information: Needs for Regulatory Change (빅데이터와 개인정보: 규제변화의 필요성)

  • Lee, Ho-Sun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1565-1570
    • /
    • 2019
  • Many possibilities of Big Data has been discussed widely for several years. And the importance of protecting personal information has been emphasized more strongly. During the process of integrating several personal information for the improvement of usability of Big Data, there are many problems occured like the likelihood of the identification of one person, the level of personal infomation used to create personalized services in the companies making and using Big Data. In this study, I summarize GDPR(General Data Protection Regulation) of EU, CCPA(California Consumer Privacy Act) of USA and domestic Big Data 3 Acts Amendment proposals. Also I discuss re-identifcation of de-identificated information, social costs of the usage agreement of personal information, possible problems in construction and combination of private and public big data, political suggestions about settlement of regulatory environment.

A Research on the Strategic Plan of Public Libraries in Urban-Rural Complex Area (도·농복합지역 공공도서관 발전 방안 연구 - 부산광역시 기장군을 중심으로 -)

  • Chang, Durk Hyun;Koo, Bon Jin
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.2
    • /
    • pp.125-147
    • /
    • 2021
  • Being one of the municipality belonging to a large metropolitan city, there are areas with a special environment of rural characteristics that are different from general urban areas. Gijang-gun of Busan Metropolitan City is a good example. Although it maintains the highest level of the number of patrons per public library and the number of books per capita in Busan, and is also promoting various projects to strengthen the knowledge and cultural competitiveness, in Gijang-gun, a Complex Area where rural and urban areas coexist, most of the resources are concentrated in urban areas, and cultural facilities that provide public services are lacking in relatively few rural areas. In this regard, this research strives to enhance the vision and strategy of the Gijang-gun's public libraries, reflecting the characteristics and needs of the patrons as viewed through their urban-rural complex environment.

A Study on the Perception of Job Experts on Data-based HR Management (데이터 기반 인사관리에 관한 직무전문가 인식 고찰)

  • Koo, Jung-Mo
    • Journal of Industrial Convergence
    • /
    • v.20 no.7
    • /
    • pp.31-36
    • /
    • 2022
  • There is a growing perception that HR management that streamlines corporate resources is necessary to retain competitive advantage. In this study, data-based HR management is focused on the perception of HR job experts and data-based HR management execution and utilization prospects at corporate sites. The subjects of the study were three HR planning/management job experts of three firms specializing in IT services in Pangyo, and focused on identifying data-based HR management execution, measurement, analysis tools, and utilization level. As a research method, open coding, axis coding, selective coding procedure based on evidence theory was presented. As a result of in-depth interviews, corporate HR management measurement indicators were divided into three areas: employee, productivity, and culture. Through this study, it was possible to find the significance of perception of the company site as to what measurement tools and mechanisms the company implemented and measured the effectiveness and efficiency of HR management.

A Comparative Study of the Influencing Factors of Smartphone Dependence between Elementary and Middle School Students (초등학생과 중학생의 스마트폰의존 영향요인에 관한 비교연구)

  • Kwon, Hyemin;Kim, Boreum
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.827-839
    • /
    • 2022
  • The severity of smartphone dependence among early adolescents, known as the most vulnerable group to smartphone addiction, is increasing. In this study, the factors affecting the smartphone dependence of early adolescents were analyzed by separating into elementary school and middle school students. For this purpose, the 1st data from Korean Children and Youth Panel Survey(2018) was used. The subjects of the study were 2,607 4th grade from elementary school and 2,590 1st grade from middle school. Factors that affect to smartphone dependence of both elementary and middle school students in common were gender, self-esteem, aggression, time spent with parents, and negative parenting attitude. On the other hand, region(city size), economic level, health status, school life satisfaction, and relationship with teachers were significant in the smartphone dependence of elementary school students, but not in middle school students. In middle school students, positive parenting attitudes were significant. Based on the results of the analysis, implications for policy establishment and social service provision were drawn to encourage the proper use of the by early youth.

A Study on vitalization of the Pohang Yeongil Port and its hinterland in the post Covid-19 pandemic (포스트 코로나 시대 지역거점항인 포항영일만항과 배후단지 활성화 방안에 관한 연구)

  • Kwak, Dong-Wook;Lee, Sung-Woo;Kim, A-Rom;Seo, Young-Joon
    • Journal of Korea Port Economic Association
    • /
    • v.38 no.1
    • /
    • pp.73-86
    • /
    • 2022
  • This study aims at investigating measures to vitalize the Pohang Yeongil New Port and its hinterland in the context of the post Covid-19 pandemic. To identify appropriate strategies, an SWOT analysis combined with fuzzy-AHP(Analytic Hierarchy Process) was applied for strategical priority. Among the SWOT factors, weaknesses and threats were found to be critical. At a more detailed level, the strategic priorities were given to insufficient infrastructure (W), neighboring ports (T), insufficient shipping network (W), low service level (W) and South-North Korea relationships (T). Given these results, several strategies to overcome core weaknesses and threats of the Pohang Yeongil Port were suggested. The results of this study may provide valuable insights for port policy makers.

The Effect of Working Capacity on Depression in the Elderly: A Comparative Focus on Urban and Rural Elderly

  • Jeong, Seong-Bae;Ko, Han-na
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.199-207
    • /
    • 2022
  • This study was conducted with the purpose of presenting data for preparing elderly work policies and mental health policies by comparing and analyzing the effects of working ability on depression of urban and rural elderly people. Data from the 16th year of the Korea Welfare Panel (2021) were used for the analysis data for this study, and data from 4,838 elderly people aged 65 and over were extracted and used for analysis. For the analysis method, descriptive statistics and regression analysis were performed using SPSS 22.0. As a result of the study, it was found that the depression decreased when the elderly were able to work. It was found that health status and household type had an effect on urban elderly, and health status and education level of rural elderly affected. Therefore, it is necessary to provide local social welfare services that are appropriate for the local characteristics, suitable for the resources and environment of urban and rural areas.

A Study on eGovFrame Security Analysis and Countermeasures (eGovFrame 보안 분석 및 대응 방안에 관한 연구)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.3
    • /
    • pp.181-188
    • /
    • 2023
  • The e-Government standard framework provides overall technologies such as reuse of common components for web environment development such as domestic government/public institutions, connection of standard modules, and resolution of dependencies. However, in a standardized development environment, there is a possibility of updating old versions according to core versions and leakage of personal and confidential information due to hacking or computer viruses. This study directly analyzes security vulnerabilities focusing on websites that operate eGovFrame in Korea. As a result of analyzing/classifying vulnerabilities at the internal programming language source code level, five items associated with representative security vulnerabilities could be extracted again. As a countermeasure against this, the security settings and functions through the 2 steps (1st and 2nd steps) and security policy will be explained. This study aims to improve the security function of the e-government framework and contribute to the vitalization of the service.

Cloud security authentication platform design to prevent user authority theft and abnormal operation during remote control of smart home Internet of Things (IoT) devices (스마트 홈 사물인터넷 기기(IoT)의 원격제어 시 사용자 권한 탈취 및 이상조작 방지를 위한 클라우드 보안인증 플랫폼 설계)

  • Yoo Young Hwan
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.99-107
    • /
    • 2022
  • The use of smart home appliances and Internet of Things (IoT) devices is growing, enabling new interactions and automation in the home. This technology relies heavily on mobile services which leaves it vulnerable to the increasing threat of hacking, identity theft, information leakage, serious infringement of personal privacy, abnormal access, and erroneous operation. Confirming or proving such security breaches have occurred is also currently insufficient. Furthermore, due to the restricted nature of IoT devices, such as their specifications and operating environments, it is difficult to provide the same level of internet security as personal computers. Therefore, to increase the security on smart home IoT devices, attention is needed on (1) preventing hacking and user authority theft; (2) disabling abnormal manipulation; and (3) strengthening audit records for device operation. In response to this, we present a plan to build a cloud security authentication platform which features security authentication management functionality between mobile terminals and IoT devices.