• Title/Summary/Keyword: 전파(傳播)

Search Result 7,807, Processing Time 0.039 seconds

Fatigue fracture of different dental implant system under cyclic loading (반복하중에 따른 수종 임플란트의 피로파절에 관한 연구)

  • Park, Won-Ju;Cho, In-Ho
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.47 no.4
    • /
    • pp.424-434
    • /
    • 2009
  • Statement of problem: Problems such as loosening and fractures of retained screws and fracture of implant fixture have been frequently reported in implant prosthesis. Purpose: Implant has weak mechanical properties against lateral loading compared to vertical occlusal loading, and therefore, stress analysis of implant fixture depending on its material and geometric features is needed. Material and methods: Total 28 of external hexed implants were divided into 7 of 4 groups; Group A (3i, FULL $OSSEOTITE^{(R)}$Implant), Group B (Nobelbiocare, $Br{\aa}nemark$ $System^{(R)}$Mk III Groovy RP), Group C (Neobiotec, $SinusQuick^{TM}$ EB), Group D (Osstem, US-II). The type III gold alloy prostheses were fabricated using adequate UCLA gold abutments. Fixture, abutment screw, and abutment were connected and cross-sectioned vertically. Hardness test was conducted using MXT-$\alpha$. For fatigue fracture test, with MTS 810, the specimens were loaded to the extent of 60-600 N until fracture occurred. The fracture pattern of abutment screw and fixture was observed under scanning electron microscope. A comparative study of stress distribution and fracture area of abutment screw and fixture was carried out through finite element analysis Results: 1. In Vicker's hardness test of abutment screw, the highest value was measured in group A and lowest value was measured in group D. 2. In all implant groups, implant fixture fractures occurred mainly at the 3-4th fixture thread valley where tensile stress was concentrated. When the fatigue life was compared, significant difference was found between the group A, B, C and D (P<.05). 3. The fracture patterns of group B and group D showed complex failure type, a fracture behavior including transverse and longitudinal failure patterns in both fixture and abutment screw. In Group A and C, however, the transverse failure of fixture was only observed. 4. The finite element analysis infers that a fatigue crack started at the fixture surface. Conclusion: The maximum tensile stress was found in the implant fixture at the level of cortical bone. The fatigue fracture occurred when the dead space of implant fixture coincides with jig surface where the maximum tensile stress was generated. To increase implant durability, prevention of surrounding bone resorption is important. However, if the bone resorption progresses to the level of dead space, the frequency of implant fracture would increase. Thus, proper management is needed.

Radio location algorithm in microcellular wide-band CDMA environment (마이크로 셀룰라 Wide-band CDMA 환경에서의 위치 추정 알고리즘)

  • Chang, Jin-Weon;Han, Il;Sung, Dan-Keun;Shin, Bung-Chul;Hong, Een-Kee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.8
    • /
    • pp.2052-2063
    • /
    • 1998
  • Various full-scale radio location systems have been developed since ground-based radio navigation systems appeared during World War II, and more recently global positioning systems (GPS) have been widely used as a representative location system. In addition, radio location systems based on cellular systems are intensively being studied as cellular services become more and more popular. However, these studies have been focused mainly on macrocellular systems of which based stations are mutually synchronized. There has been no study about systems of which based stations are asynchronous. In this paper, we proposed two radio location algorithms in microcellular CDMA systems of which base stations are asychronous. The one is to estimate the position of a personal station at the center of rectangular shaped area which approximates the realistic common area. The other, as a method based on road map, is to first find candidate positions, the centers of roads pseudo-range-distant from the base station which the personal station belongs to and then is to estimate the position by monitoring the pilot signal strengths of neighboring base stations. We compare these two algorithms with three wide-spread algorithms through computer simulations and investigate interference effect on measuring pseudo ranges. The proposed algorithms require no recursive calculations and yield smaller position error than the existing algorithms because of less affection of non-line-of-signt propagation in microcellular environments.

  • PDF

A study on the location of fire fighting appliances in cargo ships (화물선 소화설비 비치에 대한 연구)

  • Ha, Weon-Jae
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.9
    • /
    • pp.852-858
    • /
    • 2016
  • To safeguard the accommodation spaces on cargo ships from fire, structural fire protection provisions introduced by SOLAS and these measures retard the propagation of flames and smoke. SOLAS also specifies provisions for fire fighting drills. These provisions are a combination of regulations regarding structure and equipment and those dealing with the human element for the fire protection and effective responses in the event of fire. Requirements related to the human element play a supporting role to the requirements for structure and equipment because the present accommodation structure and equipment are insufficient for extinguishing a fire, therefore, fire-extinguishing activity performed by crew members is essential. To reduce human error and ensure effective fire fighting, it is necessary to install a fire-fighting system and improve the fire fighting process. The fundamental concept of fire fighting exercises is to commence fire fighting before the fire grows too big to extinguish. It is essential to relocate the storage place of fire fighting equipment to expedite the fire-fighting exercise. This study was carried out to reduce human risk for this purpose, the fire control station was relocated to a site that could be accessed from the open deck. Further, two sets of a fire fighter's outfit were stored at the same site. This relocation eliminated the risk of the crew reentering to operate the fire fighting system in the fire control station and allowed the crew to pick up the fire fighters' outfits quickly in the event of a fire. In addition, it was proposed that the IIC method be made mandatory. This method is combination of automatic fire detection system and sprinkler system which can reduce the risk of the fire fighting exercises for the crew and to suppress fire in the initial stage. This study was carried out to provide a foundation to the possible amendment of the relevant SOLAS regulations and national legislation.

Paleogene dyke swarms in the eastern Geoje Island, Korea: their absolute ages and tectonic implications (거제도 동부에 분포하는 고제3기 암맥군: 절대연대와 지구조적 의미)

  • Son, Moon;Kim, Jong-Sun;Hwang, Byoung-Hoon;Lee, In-Hyun;Kim, Jeong-Min;Song, Cheol-Woo;Kim, In-Soo
    • The Journal of the Petrological Society of Korea
    • /
    • v.16 no.2 s.48
    • /
    • pp.82-99
    • /
    • 2007
  • The Paleogene dikes intruding into the late Cretaceous granodiorite are pervasively observed in the Irun-myeon, eastern Geoje Island. They are classified into three groups: NW-trending acidic dike swarm and WNW- (A-Group) and $NS{\sim}NNE-trending$ (B-Group) basic dike swarms. Based on their cross-cutting relationships, the earliest is the acidic dike group and fellowed by A- and B-Groups in succession. The acidic dikes seem to have intruded into tension gashes induced by the sinistral strike-slip faulting of the Yangsan fault system during the late $Cretaceous{\sim}early$ Paleogene. In terms of rock-type, orientation, age, and geochemistry, A-Group and B-Group are intimately correlated with the intermediate and basic dike swarms in the Gyeongju-Gampo area, respectively. These results significantly suggest that the corresponding dike swarms are genetically related. Based on the K-Ar and Ar-Ar age data, A- and B- Groups were intruded during $64{\sim}52\;Ma$ and $51{\sim}44\;Ma$, respectively. The result means that the direction of tensional stress in and around the SE Korean peninsula was changed abruptly from NNE-SSW to $EW{\sim}WNW-ESE$ at about 51 Ma. Considering the tectonic environments during the Paleogene, it is interpreted that A-Group was injected along the WNW-trending tensional fractures developed under an regional sinistral simple shear regime which was caused by the north-northwestward oblique subduction of the Pacific plate beneath the Eurasian plate. Meanwhile, the regional stress caused by the collision of India and Eurasia continents at about 55 Ma was likely propagated to the East Asia at about 51 Ma, and then the East Asia including the Korean peninsula was extruded eastwards as a trench-rollback and the dip of downgoing slab of the Pacific plate was abruptly steepened. As a result, the strong suction-force along the plate boundary produced a tensional stress field trending EW or WNW-ESE in and around the Korean peninsula, which resultantly induced B-Group to intrude passively into the study area.

A Study on Rail Vibration and Its Reduction Plan in Central Daejeon Area (대전 도심지역의 철도진동의 영향과 대책)

  • Ryu, Myoung-Ik;Suh, Man-Cheol;Lee, Won-Kook
    • Journal of the Korean Geophysical Society
    • /
    • v.3 no.4
    • /
    • pp.269-280
    • /
    • 2000
  • Rail vibration in city zone is becoming a serious environmental problem. In order to make a reduction plan for rail vibration, the research was conducted in which many experiments to measure actual rail vibration along the railroad through the central Deajeon area. A digital vibration level meter was used to measure rail vibration. Vibration levels of Z-axis were measured at every second for the duration of the train passing. The measuring station was placed at every 5m for the distance of 55m. A total of 353 different sets of vibration level were obtained. The signals were processed to get $L_{10}$ value and analyzed in terms of distance, train velocity, and number of trains. As a result, it has been found that rail vibration exceed the allowable vibraton limit of 60 dB, at the point of 25 m far from the railroad center, which is regulated by the las of vibration and noise. Train velocity was found to affect a little for vibration level within the zone. It was also found that a trench installed along a railroad could reduce vibration level up to approximately 10 percent. A model test was conducted to investigate the influence of the location and size of trench, on the transfer of vibration. A heavy steel ball was used to generate vibrations. On the basis obtained from this study, it could be concluded that the application of distance-attenuation and the installment of a trench along railroad could be applied as a reduction plan for rail vibration. Because limitions might exist to depend on the effect of distance attenuation, trenchs excavated along a railroad might be suggested as the most efficient solution to reduce railroad vibration.

  • PDF

e-Navigation 관련 산업현황에 관한 기초연구

  • Choe, Han-Gyu;Gang, Byeong-Jae
    • 선박안전기술공단연구보고서
    • /
    • s.4
    • /
    • pp.1-108
    • /
    • 2007
  • 2007. 7. 23 IMO의 NAV(항해안전전문위원회)53차 회의에서는 e-Navigation을 해상에서의 안전, 보안, 해양환경보호를 목적으로 전자적인 수단에 의해 선박과 육상에서 해양정보를 수집, 교환, 표시함으로써 항구와 항구간의 항해 및 관련된 서비스를 향상시키는 것으로 정의하고 있다.2005년 11월 영국의 교통부 장관 Stephen 박사는 Royal Institute ofNavigation에서의 연설에서 해상안전과 환경보호를 위하여 선박의 항해를 감시하는 관제소 및 항행하는 선박에 유용하고 정확한 정보가 더 많이 필요함을 역설하였다. 그리고 첨단 기술에 의해 자동화된 항공 항법분야를 예로들면서, 선박의 항법 분야도 항해와 관련된 모든 시설 및 작업을 전자적 수단으로 대체하는 개념인 e-Navigation으로 전환되어야 하며 영국은 이에 필요한 작업을 주도하겠다는 의견을 피력하였다. Stephen은 e-Navigation 도입으로 얻을 수 있는 이익으로 첫째, 항해 실수로 인한 사고 확률저감, 둘째,사고 발생 시 인명 구조 및 피해 확산을 위한 효율적 대응, 셋째, 전통적인항해시설 설치 불필요로 인한 비용 저감, 넷째 선박입출항 수속의 간편화 및항로의 효율적 운용으로 인한 상업적 이익 등을 들었다. 반면에e-Navigation 체계로 전환 시 예상되는 장애로는 첫째, 체계 구축을 위한 비용(특히 개발도상국가들의 경우 어려움 예상), 둘째, e-Navigation의 성과 달성을 위하여 세계 전 해역의 모든 선박이 e-Navigation 체계에 동참하도록유도하는 문제, 셋째, 전자해도 표시 및 선교 장비들에 대한 표준화 문제, 넷째, 육상에 설치할 e-Navigation 센터의 설계 및 구축 등을 꼽았다.IMO는 2005년 81차 MSC(해사안전위원회) 회의에서 영국이 일본, 마샬아일랜드, 네덜란드, 노르웨이, 싱가포르, 미국과 공동으로 제안한 ‘e-Navigation전략 개발’ 의제를 2006년 82차 MSC 회의에서 채택하고, NAV(항해 전문위원회)를 통하여 2008년까지 e-Navigation의 구체적 개념을 정립하고 향후 개발하여야 할 전략적 비전과 정책을 수립하기로 하였다. 이어서 영국을 의장으로 e-Navigation 전략개발 통신작업반이 구성되었는데, 지난 년간 19개국, 16개 전문기관이 참여하여 아래의 작업이 수행되었다. ○ e-Navigation 개념의 정의와 목적 ○ e-Navigation에 대한 핵심 이슈 및 우선 순위 식별 ○ e-Navigation 개발에 따른 이점과 단점의 식별 ○ IMO 및 회원국 등의 역할 식별 ○ 이행계획을 포함한 추가 개발을 위한 작업계획의 작성 IMO에서 수행되고 있는 e-Navigation 전략 개발 의제 일정은 2008년까지이다. 이 전략 개발에 있어서 중요한 요소는 e-Navigation이 포함할 서비스범위, 포함하는 서비스 제공에 필요한 인프라 및 장비의 식별, 인프라 구축및 운용비용을 부담할 주체에 대한 논의, e-Navigation으로 인한 이익과 투자비용에 대한 비교 분석 등이다. 이 과정에서 정부, 선주, 항만운영자, 선원등의 입장 차이와 선진국과 개발도상국 간의 경제 수준 차이는 전략 개발에있어 큰 어려움을 줄 것이므로, 이들이 합의된 전략을 만들기 위해서는 예정된 기간보다 다소 늦어질 가능성도 있다.e-Navigation 전략 개발이 완료되면 1단계로는 해상교통 관제시스템, 선박선교 장비, 무선 통신장비 등에 대한 표준화 작업이 이루어질 것이다. 이 과정에서 각국 간에 자국 보유 기술을 표준화시키기 위한 경쟁이 치열할 것으로 예상된다. 2단계에서는 e-Navigation 체계 하에서의 다양하고 풍부한 서비스 제공을 위한 관련 소프트웨어 및 하드웨어의 개발이 이루어질 것으로전망되는데, 이는 지난 10년간 육상에서 인터넷망 설치 후 이루어진 관련 서비스 산업의 발전을 돌아보면 쉽게 짐작할 수 있을 것이다.e-Navigation 체계 하에서 선박의 항해는 현재와는 전혀 다른 패러다임으로 바뀔 것이다. 예를 들어 현재 입출항 시 요구되던 복잡한 절차는one-stop 쇼핑 형태로 단순화되고, 현재 선박 중심의 항해에서 육상e-Navigation 센터가 적극적으로 관여하는 항해 체계로 바뀔 것이며, 해상정보의 공유와 활용이 무선 인터넷을 통해 보다 광범위하게 이루어질 것이 다.e-Navigation의 잠재적 시장 규모는 선박에 새로이 탑재될 지능형 통합 항법시스템 구축과 육상 모니터링 및 지원 시스템 등 직접 시장이 약 50조원,전자해도, 통신장비, 관련 서비스 컨텐츠 등 간접 시장의 규모가 150조원으로 총 200조원으로 대략 추산하고 있다. 향후 이 거대한 시장을 차지하기 위한 전략 수립이 필요한 시점이다. 지금까지 항해 장비 관련 산업은 선진국의일부 업체들에 의해 독점되어 왔다. 우리나라는 조선과 해운에서 모두 선진국임에도 불구하고 이 분야에서는 대부분 수입에 의존해 왔다. e-Navigation체계 하에서는 전체 시장이 커지고 장비의 사양이 표준화됨에 따라 어느 소수 업체가 현재처럼 독점하기는 더 이상 어려울 것으로 예상된다. 따라서e-Navigation은 우리나라도 항해 장비 분야 시장을 차지할 수 있는 좋은 기회라고 할 수 있다. 특히 조선 1위의 장점을 적극 활용한다면 다른 나라보다우위의 경쟁력을 확보할 수도 있다. 또한, 서비스 분야의 시장은 IT 기술과밀접한 관계가 있으므로 IT 강국인 우리나라가 충분한 경쟁력을 갖고 있다고 할 수 있다.그러나, EU를 비롯한 선진국에서는 이미 e-Navigation 에 대비한 연구를10여년 전부터 수행해 왔다. 앞에서 언급한 EU의 MarNIS 사업은 현재 거의마무리 단계로 당장 실용화 할 수 있는 수준에 있는 것으로 보인다. 늦었지만 우리도 이를 따라잡기 위한 연구를 서둘러야 할 것이다. 국내에서도e-Navigation의 중요성을 깊이 인식하고, 2006년에는 관련 산학연 전문가들로 작업반을 구성하여 워크숍 등을 개최한 바 있다. 또한 해양수산부에서도e-Navigation 핵심기술 개발을 위한 연구사업을 기획 추진하고 있다.그러나 현재 항해통신장비들의 기술기준은 ITU의 전파규칙(RR)과 IMO결의 및 SOLAS 협약을 따르고 있는데 이들 규약이나 결의에 대한 국제적인 추이와 비교할 때 국내의 기술은 표준화되지 못한 부분이 많은 실정이다.본 연구에서는 e-Navigation sytem중 표준화가 필요한 요소와 전자해도,AIS 등 e-Navigation(통합전자항법시스템)관련 국내산업현황 실태조사를 통해 국내 e-Navigation기술개발 동향에 대해 조사하고자 한다.

  • PDF

CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process (CIA-Level 기반 보안내재화 개발 프레임워크)

  • Kang, Sooyoung;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.909-928
    • /
    • 2020
  • From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that "vulnerabilities are not found" is not equal to "product does not have any vulnerabilities". So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding "security-by-design" concept from the 1980s. Security-by-design means reducing product's complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC.

The Present Status and Characteristics of Landscape Components of Gugokwonlim Created by Classical Scholars of Joseon Dynasty (조선선비가 설정한 구곡원림의 현황과 경물 특성)

  • Rho, Jae-Hyun;Choi, Yung-Hyun;Kim, Sang-Beum
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.36 no.3
    • /
    • pp.37-47
    • /
    • 2018
  • This study was attempted to understand present status and characteristics of landscape components of the domestic Korean Gugokwonlim created by the classical scholars in the Joseon Dynasty. The results are as follows. First, Distribution of Gukokwonlim in Korea shows that 55(51.4%) are located in Daegu and Gyeongsangbuk-do, and 22(20.56%) are located in Chungcheongbuk-do. Concentrated locations of Gugok are on the part of Baekdudaegan, from Sobaeksan mountain to Sokrisan mountain via Wolaksan mountain, and the Nakdong River basin of the Nakdong vein in the right bank. This consideration seems to be closely related to the academy of Yeongnam Confucianism and the their trend of Wonrim enjoyment. Second, according to the result of examining the distribution of Gugok according to the basic local government authority, The biggest number of the Gugok places(10 places, 9.35%) are located in Andong, which is called 'the capital of Korean spiritual culture.' Additionally in order, 9 places(9.45%) is located in Goesan, 8 places(7.48%) in Mungyung, 6 places(5.61%) in Bonghwa, and 5 places(4.67%) in Yeongju. Third, in order to the creating time of Gugokwonlim, 33 (33.0%) were created in $18^{th}$ century, and other 33 (33.0%) were created in $19^{th}$ century. In addition, 14 were created during $20^{th}$ century, while 13 were created in $17^{th}$ century. And 4 were created in $16^{th}$ century. Respectively. great number of $18^{th}$ and $19^{th}$ centuries shows that many(66.0%) Gugokwonrim were created between late 18th to 19th centuries. Fourth, There were 97(90.65%) of 'Gugok' in the form of collecting type, and a total number of bottom-up style Gugok were 99(92.5%) while top-down style Gugok were 8(7.5%). Fifth, Among the contents of Gugok, 67 were found in pome of Gugok(64.49%), 29 caved letters in rock(27.10%), and 16 in painting of Gugok(14.95%). Sixth, The most emerged landscape components of Gugok was Dae(臺) 124(13.05%), followed by Am(巖) 115[11.2%, including of Am(岩)] 115(11.2%), and Dam(潭) 73(7.68%), Jeong(亭) 48(5.05%), Dong(洞) 39(4.10%), San(山) 36(3.78%), Am(岩, rocks) 31(3.26 %), Bong(峯, peaks) 27(2.84%), Yeon(淵) 23(2.42%) and Chun(川) and Tan(灘) 22(2.31%). Mostly, common landscape components of Gugok are entrusted natural things. It is expected that more studies about the analysis of characteristics of Gugok's positioning types considering total distance and a gradient are required to understand more clearly characteristics and location distribution of true Gugok and its landscape components.

Physiological and Ecological Characteristics of the Apple Snails (왕우렁이 (apple snails)의 생리.생태적 특성에 관한 연구)

  • Lee, Sang-Beom;Koh, Mun-Hwan;Na, Young-Eun;Kim, Jin-Ho
    • Korean Journal of Environmental Agriculture
    • /
    • v.21 no.1
    • /
    • pp.50-56
    • /
    • 2002
  • This experiment was carried out to obtain some information about overwintering, physiological and ecological characteristics of apple snails. Another purpose of this experiment was to characterize an appetite for rice plants by apple snails and to elucidate their choice of fresh green ones (vegetables, some other crops, weeds in rice fields). The freshwater snails were found with higher population at sites abundant organic compounds such as plant debris and at regions with high temperature. They also prefer calcium-rich water. This is a naturally occurring process. Apple snails were exceptionally veil-adapted to the south regions of Korea, especially Janghang, Jangseong and Haenam, even if the temperature of winter season is cold below 0$^{\circ}C$. Apple snails were not very selective in their food choice and eat almost everything available in their environment. A snail have something called a radula in its mouth for grinding up its food. A apple snail also chews on fruits and young succulent plant barks. In case of reproduction. apple snails deposit about 157$\sim$784 (average of 321 eggs) milky white to pale orange colored eggs above the waterline. In approximately every 22.4 seconds a new egg appears. The total time needed to deposit a egg mass varies from 58 minutes$\sim$4 hours 13 minutes. Apple snails reproduct actively from May to June and from September to October. An appetite of apple snails for rice plants was the different depending on their size and glowing stage for rice plants. Apple snails had a great appetite of rice plants as well as dropwort, tomato, cabbage, radish, aquatic plants etc. They preferred to eat young rice plants and drastically quit eating rice plants of over 40 cm in height. Thus considering the food preference of apple snail for various plants including rice, they were thought to be a potentially strong predator in fields, especially, at regions with warmer winter.

A Study for strategic cooperaton of enterprise security and business (기업보안과 비즈니스의 전략적 협력에 관한 연구)

  • Ryu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.28
    • /
    • pp.103-130
    • /
    • 2011
  • This study is the research of enterprise security for raising the profitability and stability of Korean companies in global business environment and strategic cooperation of business. As the scientific technology gets complicated as day goes by and new competitors appear regardless the border in the modern business environment, the situation happens frequently which the huge company hands over their market to the new one armed with the innovative thinking overnight. To survive such new environment, the answer is the change of paradigm regarding business management method at the new point of view. With the low level of security risk management of Korean companies which stick to old habit, the security management which helps the companies secure profits is not affordable. The global village where the population of 7 billions live in 21st century is facing up to the rapid ecological adaptation. The rapid change of climatic environment creates the hundreds of thousands of sufferers in a moment, and we have been watching the millions of livestock are buried alive due to new contagious disease everyday. Such change encourages the humans in global village to change the basic way of living. The business ecosystem which is the basic root for economic life cannot be an exception. To survive the business environment of 21st century, the security risk management at management level is required and the reporting line of companies should be established newly for raising business competing power through security risk management. The companies should bear in mind that they can be disappeared into our old memories overnight if they are not sensitive to the changing environment. Out of new risks for the modern companies, the field especially Korean companies are dealing easily is the security risk. Not like past, the security risk which's size is much more massive and its propagation velocity is very fast is the one of important business risks which the management should take care. Out of security risks which influence on the modern companies significantly, the brand of companies, protection of their reputation, continuity of production and operation and keeping customer's trust are prior to the others. This study offered the suggestion regarding enterprise security and the strategic cooperation of business to deal with such security risk effectively.

  • PDF