• Title/Summary/Keyword: 정보보호경제성

Search Result 266, Processing Time 0.022 seconds

A Strategy to Activate Design Industry for Provincial Development - Centering on the region of Daegu and Gyeongbuk - (지역발전을 위한 디자인산업 활성화 전략 -대구 경북지역을 중심으로-)

  • Yun, Young-Tae;Kim, Yun-Hee
    • Archives of design research
    • /
    • v.18 no.3 s.61
    • /
    • pp.55-62
    • /
    • 2005
  • Recently, the opening of the world economy and regional ization of national demand endless endeavors and investments to upbring design-industry for regional economic development. Our domestic commodities, declined in price competitiveness against China and Southeast Asian nations, need construction of brand image of commodities and consumers' response through expanded concernments in marketing spheres. The design-industry is a important means to strengthen competitiveness of the domestic industry through discrimination of commodities and creativity of high added value. Design-industry has some problems in circumstances; commodity development and marketing are below the level in the sphere of manufacture industry yet and businessmen are unwilling to invest demanded for development of new design. Establishment of the personal foundation, useful for accumulating competent designers' experiences and technologies, can not pass limit. In addition, a system and a policy to protect design-industry have a problem in effectiveness. Concrete strategies to activate design industry which meets social and cultural circumstances of Daegu and Gyeongbuk region are to establish policy for construction of specialists' infra, systematization of study & development of design, common ownership of information on design, and expansion of design company. The business to upbring design in the region should be operated to develop competitive commodities which is helpful to the regional economy and to increase value of the regional enterprises' brand. In addition, foundation of design should be expanded personal, material, and informational infra through design-centered so that they are helpful to activate economy of Daegu and Gyeongbuk through making design reformational cluster.

  • PDF

Using Mixed Logit Model and Latent Class Model to Analyze Preference Heterogeneity in Choice Experiment Data (선택실험법 자료에서의 선호이질성 분석을 위한 혼합로짓모형 및 잠재계층모형의 활용)

  • Yoo, Byong Kook
    • Environmental and Resource Economics Review
    • /
    • v.21 no.4
    • /
    • pp.921-945
    • /
    • 2012
  • Conditional Logit (CL) model is widely used since its model estimation and interpretation of results of the model is relatively easy, on the other hand, it has the limit of preference heterogeneity of respondents being not fully considered. In this study we used the two models, Mixed Logit (ML) Model and Latent Class Model (LCM) to explain preference heterogeneity of respondents for protection for Boryeong Dam wetland. As a result of the examination for heterogeneity in Boryeong city and six metropolitan areas, we found there was significant difference between two regions. While there was explicit preference heterogeneity within respondents in Boryeong city, we found little heterogeneity within respondents in six metropolitan areas. Thus in the case of six metropolitan areas, CL model can be used for parameter estimation while in the case of Boryeong city, WTP estimates are based on parameter estimates from ML model to reflect the heterogeneity within respondents. Additionally, ML model with interaction and 2-class LCM for respondents in Boryeong city were used to explain the sources of the heterogeneity. The ML model with interaction has advantage of explaining individual unobserved heterogeneity. However The comarison between these two models reflects the fact that LCM provided added information that was not conveyed in the ML model with interaction. Thus, Preference heterogeneity within respondents in this study may be better explained by class level through LCM rather than indiviual level through ML model.

  • PDF

일본의 '산업 클러스터 계획 프로젝트' 의 성공요인과 시사점 - TAMA 클러스터의 사례를 중심으로 -

  • 류태수
    • Proceedings of the Technology Innovation Conference
    • /
    • 2005.08a
    • /
    • pp.141-167
    • /
    • 2005
  • 본 연구의 목적은 우리나라보다 앞서 실시하고 있는 일본의 산업 클러스터 계획 프로젝트의 거시적인 현황과 가장 성공적이라고 하는 TAMA클러스터의 사례를 분석하여 향후 우리나라 클러스터 정책 시행에 필요한 시사점을 얻는데 있다. 특히 TAMA클러스터의 성공은 이를 직접 관리하고 있는 민간차원의 중개조직인 TAMA산업활성화협회의 운영전략을 집중적으로 분석하여 봄으로써 도입 가능성에 대한 진단과 정책적 제안을 하고자 한다. 첫째, 일본의 19개 지역별 산업 클러스터 계획의 공통점은 어느 것도 도도부현의 영역을 초월한 광역적인 클러스터를 형성하고 있다. 광역단위의 집적은 상대적으로 클러스터 계획에 대한 중요성과 실행주체를 망각하기 쉬워 실패할 가능성이 비교적 높을 수 있다 이러한 점을 극복하기 위한 대안으로 산학연의 3주체 간 연계를 주로 담당하는 민간중심의 중개조직을 두어 운영하고 있다. 둘째, 클러스터 정책기간은 시작에서 자립까지 20년을 상정하고, 제1기 5년간은 산업 클러스터 네트워크 구축기, 제2기 5년은 산업 클러스터 성장기 그리고 마지막 제3기 10년은 산업 클러스터의 자율적 발전기로서 책정되어 수행하는 것이 바람직하다고 보고 있다. 셋째, 개별적인 산업 클러스터의 비전, 목표, 중장기 전략의 올바른 수립이 필요한데 백화점식이 아닌 대상산업 및 대상 주체에 대한 선택과 집중의 전략성이 엿보인다. 넷째, 정책 대상의 범위는 연구개발에서 판매에 이르기까지 전 비즈니스 프로세스를 대상으로 하고 있으며 클러스터 관련 정책수행 주체들의 정책조율, 중복 투자의 회피 그리고 효과적인 정책을 시행하기 위하여 수평적인 연락망과 협의체를 구성하고 있다. 다섯째, TAMA협회는 전통적인 동종 산업중심의 협회 기능과는 달리 제품개발형 중소$\cdot$중견기업을 대상으로 신기술개발과 신사업 전개를 위한 전략적 지원을 하고 있다. 비교적 개별적인 기술개발 능력은 물론 독자적인 마케팅 능력을 갖고 있어 일반적인 보호 대상자로서의 중소기업과는 차원이 다르며 기존의 하청관계라는 수직적 의존적인 존재가 아니라 세계적으로 니치 시장에서 경쟁력을 가지고 있는 대기업과 대등한 입장의 우량기업이라는 것이 특징이다. 여섯째, 지금까지는 기업을 지원하는 각 기관들이 각각 독자적으로 운영하여 경영자원의 분산과 이용으로 수혜자인 중견$\cdot$중소기업의 입장은 물론 지방자치단체 및 중앙정부의 차원에서 분석하여 볼 경우 경영자원의 Critical Mass를 확보하기 어려웠다. TAMA협회는 네트워크 조직으로서 주로 소프트적인 지원을 통하여 원활하게 수행하고 있음. 정보와 네트워크만을 가지고 조직간 관계를 중개하는 가벼운 네트워크 조직으로서 운영하는 방법은 한국의 경우에도 적용이 가능하며 매우 유용하다고 생각된다.

  • PDF

A Study on Detecting Black IPs for Using Destination Ports of Darknet Traffic (다크넷 트래픽의 목적지 포트를 활용한 블랙 IP 탐지에 관한 연구)

  • Park, Jinhak;Kwon, Taewoong;Lee, Younsu;Choi, Sangsoo;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.821-830
    • /
    • 2017
  • The internet is an important infra resource that it controls the economy and society of our country. Also, it is providing convenience and efficiency of the everyday life. But, a case of various are occurred through an using vulnerability of an internet infra resource. Recently various attacks of unknown to the user are an increasing trend. Also, currently system of security control is focussing on patterns for detecting attacks. However, internet threats are consistently increasing by intelligent and advanced various attacks. In recent, the darknet is received attention to research for detecting unknown attacks. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. In this paper, we proposed an algorithm for finding black IPs through collected the darknet traffic based on a statistics data of port information. The proposed method prepared 8,192 darknet space and collected the darknet traffic during 3 months. It collected total 827,254,121 during 3 months of 2016. Applied results of the proposed algorithm, black IPs are June 19, July 21, and August 17. In this paper, results by analysis identify to detect frequency of black IPs and find new black IPs of caused potential cyber threats.

Website Falsification Detection System Based on Image and Code Analysis for Enhanced Security Monitoring and Response (이미지 및 코드분석을 활용한 보안관제 지향적 웹사이트 위·변조 탐지 시스템)

  • Kim, Kyu-Il;Choi, Sang-Soo;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.871-883
    • /
    • 2014
  • New types of attacks that mainly compromise the public, portal and financial websites for the purpose of economic profit or national confusion are being emerged and evolved. In addition, in case of 'drive by download' attack, if a host just visits the compromised websites, then the host is infected by a malware. Website falsification detection system is one of the most powerful solutions to cope with such cyber threats that try to attack the websites. Many domestic CERTs including NCSC (National Cyber Security Center) that carry out security monitoring and response service deploy it into the target organizations. However, the existing techniques for the website falsification detection system have practical problems in that their time complexity is high and the detection accuracy is not high. In this paper, we propose website falsification detection system based on image and code analysis for improving the performance of the security monitoring and response service in CERTs. The proposed system focuses on improvement of the accuracy as well as the rapidity in detecting falsification of the target websites.

Open Markets and FDS(Fraud Detection System) (오픈마켓과 부당거래 방지 시스템)

  • Yoo, Soon-Duck;Kim, Jung-Ihl
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.113-130
    • /
    • 2011
  • Due to the development of information and communication technology, the global influence on politics, economics, society, and culture has grown. A major example of this impact on the economic sector is the growth of e-commerce, which increases both the speed and efficiency of businesses. In light of these new developments, businesses need to shift away from the misconception that information overwhelms to embrace the enhanced competitiveness that e-commerce provides. However, concern about fraudulent transactions through e-commerce is pertinent because of the loss in both critical revenue and consumer confidence in open markets. Current solutions for fraudulent transactions include real-time monitoring and processing, payment pending, and confirmation through SMS, E-mail, and other wired means. Our research focuses on the management of Fraud Detection Systems (FDS) to safeguard online electronic payment systems. With effective implementation of our research we hope to foster an honorable online trading culture and protect consumers. Future comparative research in domestic and abroad markets would provide further insight into preventing fraudulent transactions.

A Study of the Operation Management Strategy on the National Critical Infrastructures : Transportation and Logistics Sector

  • Chung, Sung-Hak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.89-97
    • /
    • 2021
  • The objective of this study is to propose an operation management strategy for the connectivity which are the designated and managed in sector of the transportation and logistics on the national critical infrastructures. The industrial structure is becoming advanced. The national critical infrastructure managed by the shows forms of the cooperative connection and collaborative R&D. Also, in-depth and specific analysis for the disaster safety budget are implemented to consideration for the R&D life cycle. The government responsibility are expanded comprehensively. Needs are exchanging life styles by the economic and safety demands. At this trends, this study encourage facility maintenance and scientific management to the public service. Throughout the result of this study, national critical infrastructure are implementing for protection plan of the sustainable maintenance and management. And, we have to prepare and implement for the consideration of the characteristics through comprehensive guidelines. This study contributes to the disaster and safety management by proposed an operation strategy of the cooperative connection in the sector of transportation and logistic sector on the national critical infrastructure.

An Incremental Elimination Method of EEG Samples Collected by Single-Channel EEG Measurement Device for Practical Brainwave-Based User Authentication (실용적 뇌파 기반 사용자 인증을 위한 단일 채널 EEG 측정 장비를 통해 수집된 EEG 샘플의 점진적 제거 방법)

  • Ko, Han-Gyu;Cho, Jin-Man;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.383-395
    • /
    • 2017
  • Brainwave-based user authentication technology has advantages such as changeability, shoulder-surfing resistance, and etc. comparing with conventional biometric authentications, fingerprint recognition for instance which are widely used for smart phone and finance user authentication. Despite these advantages, brainwave-based authentication technology has not been used in practice because of the price for EEG (electroencephalography) collecting devices and inconvenience to use those devices. However, according to the development of simple and convenient EEG collecting devices which are portable and communicative by the recent advances in hardware technology, relevant researches have been actively performed. However, according to the experiment based on EEG samples collected by using a single-channel EEG measurement device which is the most simplified one, the authentication accuracy decreases as the number of channels to measure and collect EEG decreases. Therefore, in this paper, we analyze technical problems that need to be solved for practical use of brainwave-based use authentication and propose an incremental elimination method of collected EEG samples for each user to consist a set of EEG samples which are effective to authentication users.

A study on the applied Virtual Reality in the On-Line marketing of the shoes (On-Line 신발주문 반품률 제고를 위한 가상현실 적용사례)

  • Choi, Sung-Won
    • Archives of design research
    • /
    • v.17 no.4
    • /
    • pp.191-200
    • /
    • 2004
  • The health of feet is connected with individual's health and affects a man's activity. Shoes need to be designed to protect feet and to absorb the impact of land. Thus, design, comfort and economical efficiency are important factors of shoes. Consumers can choose suitable shoes for their feet in off-line shopping. However, in on-line shopping, because they can not wear shoes, compare to the off-line shopping, there are many problems in internet shopping. First, consumers can get limited information of shoes because they must search information of purchase without other's help. Second, because consumers can not get important information such as design, size and a comfort of wearing, they can not make a careful decision. Above these, the solution of user-oriented internet shopping is development of new type of prototype which is accessible to user and to offer visual information through 3D virtual reality.

  • PDF

A Study on Redefinition of Cultural Diversity and Analyzing Frame based on Media Convergence Environment (융합미디어 환경에 따른 문화다양성 범주 설정 및 분석 프레임 연구)

  • Ahn, Ho-Rim;Park, Tae-Soun
    • Korean journal of communication and information
    • /
    • v.63
    • /
    • pp.76-100
    • /
    • 2013
  • This work is for redefining of cultural diversity and suggesting measurement frame by casting light on changing cultural environment according to evolution of digital convergence media. So far, most of studies tend to confuse at using media diversity and cultural diversity and resultingly the concept of cultural diversity is not founded right yet. In communications field, there is a limit to measure cultural diversity which is substantive content because analysis of media diversity is mainly focused on financial measuring and quantitation. Therefore we define digital convergence media culture as metaculture here for analysis of cultural diversity. Additionally, we catagorize and analysis cultural diversity based on this metaculture into pluralism of media activity, diversity of cultural expression, diversity of cultural diffusion and diversity of cultural cognition. These measuration variables of the four categories are factors which can lighten aspects of cultural diversity in digital convergence media environment. Analysis of these factors of the four catagories will suggest a criterion to establish policies to protect cultural diversity. The policy of cultural diversity is to construct a cultural commune in envirnment of meta culture.

  • PDF