• Title/Summary/Keyword: 정보보호경제성

Search Result 266, Processing Time 0.033 seconds

A Study on the Estimating Visitor's Economic Value of the Mt. Kumjung by Using Individual Travel Cost Model (개인여행비용법(Individual Travel Cost Model)에 의한 금정산 방문객의 경제적 가치추정)

  • Joo, Soo-Hyun;Lee, Dong-Cheol;Hur, Yoon-Jung
    • Management & Information Systems Review
    • /
    • v.33 no.2
    • /
    • pp.301-315
    • /
    • 2014
  • The purpose of this study is to estimate the economic value of the Kumjung Mountain, using a Individual Travel Cost Model(ITCM). This paper compares Poisson and negative binomial count data models to measure the tourism demands. Interviewers were instructed to interview only individuals. So the sample was taken in 700. A dependent variable that is defined on the non-negative integers and subject to sampling truncation is the result of a truncated count data process. The results suggest that the truncated negative binomial model is improved overdispersion problem and more preferred than the other models in the study. This study emphasizes in particular 'travel cost' that is not only monetary cost but also including opportunity cost of 'travel time'. According to the truncated negative binomial model, estimates the Consumer Surplus(CS) values per trip of about 60,669 Korean won and the total economic value was estimated to be 252,383 Korean won.

  • PDF

[Retracted]Cyber Threat Analysis on Network Communication in Power System and Countermeasures Suggestions ([논문철회]전력계통 네트워크 통신방식 변화에 따른 사이버위협 분석 및 대응방안 제시)

  • Il Hwan Ji;Seungho Jeon;Jung Taek Seo
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.91-102
    • /
    • 2023
  • The Energy Management System (EMS) communicates with power plants and substations, monitors the substations and plant operational status of the transmission and substation system for stability, continuity, real-time, and economy of power supply, and controls power plants and substations. Currently, the power exchange EMS communicates with power plants and substations based on the serial communication-based Distributed Network Protocol (DNP) 3.0 protocol. However, problems such as the difficulty of supply and demand of serial communication equipment and the lack of installation space for serial ports and modems are raised due to the continuous increase in new facilities to perform communication, including renewable power generation facilities. Therefore, this paper presents a TCP/IP-based communication method instead of the existing serial communication method of the power exchange EMS, and presents a security risk analysis that may occur due to changes in the communication method and a countermeasure to the security risk.

A Study on Authentication and Management Scheme of RFID Tag for Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 태그의 인증과 관리에 관한 연구)

  • Seo Dae-Hee;Lee Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.81-94
    • /
    • 2006
  • This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID Tag's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID Tag to be applied in the ubiquitous-computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the Passive-tag-Performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive-tag-based networks as the authentication level is established based on the secure authentication of each tag and the service that the tag delivers in the passive-tag-based networks and as the same service and authentication levels are applied, and the active-tag-based network system proposed herein is not merely a security service against illegal RFID tags by performing a current-location and service registration process after the secure authentication process of the active RFID tag, but is also a secure protocol for single and group services, is proposed in this study.

Emergency Action Plan Index of Saemangeum Lake Using Flood Characteristics (홍수특성을 이용한 새만금호 비상대처계획 지표개발)

  • Kim, Dong Joo;Maeng, Seung Jin;Lee, Seung Wook;Kim, Hyung San
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.422-422
    • /
    • 2018
  • 우리나라의 간척사업은 고려시대 중엽부터 서남해안에 다수 산재되어 있는 천혜적인 간척 적지를 대상으로 지속적으로 추진되어 국토확장 및 식량 자급달성에 기여하여 왔다. 그러나, 최근 들어 쌀 수급 등 농업정책의 변화, 비용에 대한 경제성 평가의 변화, 개발과 보전에 관한 이해당사자간의 대립 등으로 신규 간척사업의 추진이 어려워지고 기존 간척지의 토지이용 목적 변화와 이치수 기능개선을 목적으로 배수갑문을 확장하는 등의 사업이 추진되고 있다. 본 연구에서는 방조제 상류지역 및 지천에서 이상홍수 유입에 따른 방조제 안정성 검토를 실시하였다. 호내로 유입되는 빈도별 홍수량에 따른 각 지점별 수위변화를 이용하여 방조제 비상대처계획에 대한 재난관리 지표로 활용할 수 있는지를 확인한다. 이를 위해 선정된 방조제를 중심으로 빈도별 홍수량을 산정하여 수문학적 안정성을 검토하고, 빈도별 홍수량에 따른 호내의 홍수위 변화를 통하여 비상대처계획 시나리오를 구성하고자 한다. 새만금 유역의 수치모델링에 필요한 범위를 설정하고, 모델 구성 및 자료를 입력한 후 검 보정을 통하여 모델의 신뢰성을 검증한 후 모델운영 조건을 설정하였다. 새만금 종합개발계획(MP)이 완료되었을 경우를 가정하여 통합운영을 실시하였다. 호내 관리수위에 따른 100, 200, 500, PMF 홍수량 유입시에 호내 홍수위 모의를 수행하였다. 또한, 비상단계 중 초기단계인 '관심단계'를 "이상홍수 발생부터 관리수위 EL-1.5m까지"로 설정한다면 방조제 초기 재난대응이 유리해 질 것으로 판단된다. 또한, '주의단계'는 "관리수위 EL-1.5m부터 호내 관리홍수위 EL+1.5m까지"로 '경계단계'를 "호내 관리홍수위 EL+1.5m부터 제당 내측사석보호공 홍수위까지", '심각단계'를 "제당 내측사석보호공(만경유역 EL+4.5m, 동진유역 EL+2.5m) 이상의 홍수위"로 설정한다면 방조제 관리자에게 세부화된 정보 및 지표를 제공해 줄 것이라 판단된다. 방조제 비상상황 단계별 분류에서 이상홍수위 발생후의 시간을 수치모의를 통해 구분하였으며 정성적인 위기상황 판단이 아닌 구체적인 수치로 된 지표들을 방조제 위기상황 재난지표로 활용한다면 상황 관리자의 위기상황 판단과 대처를 위한 의사결정에 도움이 될 것으로 기대한다.

  • PDF

A Structural Analysis of News Narratives on Labor Movements in Korea

  • Chon, Bum-Soo;Jang, Won-Yong
    • Korean journal of communication and information
    • /
    • v.16
    • /
    • pp.136-167
    • /
    • 2001
  • 본 논문은 1996년 노동법 개정을 둘러싼 노동계의 총파업에 대해 보수적 성향을 갖는 조선일보와 진보적 성향을 갖고 있던 한겨레가 어떠한 방식으로 이러한 쟁점을 재현하고 해석하는 지를 분석했다. 당시의 노동계 총파업은 내부적으로는 민주화에 따른 시민사회의 성숙과 외부적으로는 글로벌라이제이션에 따른 국가 간 경쟁의 가속화라는 두 가지 정치경제학적 요인이 교차하는 공간에서 일어났으며, 동시에 광범위한 국민적 지지를 확보한 파업으로 그 상징적 의미를 갖고 있다. 이와 같이 주요 사회적 쟁점에 대한 두 신문간의 차이를 분석하기 위해 질적 분석 방법인 서사분석(Narrative Analysis)과 양적 분석 방법인 조응분석(Correspondence Analysis)을 사용했다. 서사분석은 사건의 발생과 진행 그리고 결말 과정에서 대립되는 행위자의 상징적 담론을 분석함으로써 사회적 쟁점에 대한 신문사간의 뉴스보도의 차이점 또는 유사성을 구분할 수 있으며, 조응분석은 주요 쟁점에 대해 행위자들이 어떠한 방식으로 서로 연계되는 지를 파악함으로써 역동적으로 총파업에 대한 행위자들의 관계의 변화를 공간적으로 탐색할 수 있는 장점을 갖고 있다. 서사분석 결과, 두 신문은 각각 서로 다른 서사구조를 기반으로 주요 행위자의 담론적 기호를 정반대로 구성하고 있었다. 사건 발생 단계에서는, 두 신문이 각각 국가 경쟁력 강화와 노동전 보호를 중심적인 서사구조로 설정해 차이를 보였으며, 대통령 및 여당과 민주노총이 대립적인 행위자로 설정되었다. 사건의 발전 단계에서는, 총파업의 불법성과 적법성 문제에 대한 갈등을 기본 서사구조로 제시한 채, 노동계를 포함한 시민사회와 정부기관이 대립적인 행위자로 등장했다. 사건의 갈등 해소 단계에서는 문제 해결을 위한 방법으로 두 신문이 대통령과 야당 지도자간의 정치적 해결과 노동법 통과에 대한 위헌론 제기를 중심으로 한 노동단체들의 지속적인 연대를 중심 서사구조로 각각 제시했다. 이 시기에서 주요 행위자들의 대립관계는 종료되었다. 조응분석 결과, 사건 발생과 위기 고조 단계, 그리고 갈등 해소 단계등 모든 시기에서 두 신문의 주요 행위자 구성에 있어서 차이가 나타났다. 다시 말해, 조선일보는 기본적으로 총파업을 둘러싼 문제의 구성과 발전, 해소 과정에서 정당이나 대통령, 야당 지도자 등과 같은 정치관련 행위자를 강조하고 있었다. 반면에, 한겨레는 대체로 로든 사건진행 단계에서 노동 관련 단체들과 시민단체의 역동적인 연대와 활동에 초점을 맞추고 있는 것으로 나타났다.

  • PDF

A Study on the Determination of Certificate of Origin in Agriculture Sector - Focused on FTA Agreements - (우리나라 농산물 원산지 결정기준에 관한 연구 - 기 체결 FTA 협정을 중심으로 -)

  • Park, Hyun-Hee;Cho, Sung-Je
    • International Commerce and Information Review
    • /
    • v.14 no.2
    • /
    • pp.447-470
    • /
    • 2012
  • A Certificate of Origin is used in international trade. It is a printed form, completed by the exporter or its agent and certified by an issuing body, attesting that the goods in a particular export shipment have been wholly produced, manufactured or processed in a particular country. FTA rules of origin in recent FTA agreement is a very complex procedure that requires international negotiations in the field has become the largest issues. Case of Korea-Chile FTA, starting with the origin criteria for each agreements is inconsistent due to differences between countries is an area that is not easy to negotiate. This study is covered in the agreement signed on the origin criteria for adequate review and comparison by item currently being pursued through the FTA was signed during the implications that can be applied to the agricultural sector has to offer.

  • PDF

A Study on a Plan for Improving an Unmanned Security System According to Security Threat (복합적 보안위협에 따른 기계경비 개선방안 연구)

  • Kong, Byung Seok;Hwang, Hyun Seok;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.71-76
    • /
    • 2014
  • In modern society, a social economic change is brought about, because time space limitation regarded to be restrictive in times past was overcome owing to its rapid development on the basis of IT technology. The creation of new knowledge became the basis of competitiveness of nations and companies. As competition intensifies among nations and countries in relation to the development of core technology, companies make investment with placing much weight on the development of new technology, but on the other hand, technology leakage incident continuously occurs due to a lack of understanding to protect technology. This is the largest cause of impeding the competitiveness of nations and companies. And now, it is urgent to take security measures against this. Therefore, this paper analyzes institution and system weakness in the physical security area in the integrated security environment, and then identifies all problems about this, and proposes a plan for solving these.

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

Battery Level Calculation and Failure Prediction Algorithm for ESS Optimization and Stable Operation (ESS 최적화 및 안정적인 운영을 위한 배터리 잔량 산출 및 고장 예측 알고리즘)

  • Joo, Jong-Yul;Lee, Young-Jae;Park, Kyoung-Wook;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.1
    • /
    • pp.71-78
    • /
    • 2020
  • In the case of power generation using renewable energy, power production may not be smooth due to the influence of the weather. The energy storage system (ESS) is used to increase the efficiency of solar and wind power generation. ESS has been continuously fired due to a lack of battery protection systems, operation management, and control system, or careless installation, leading to very big casualties and economic losses. ESS stability and battery protection system operation management technology is indispensable. In this paper, we present a battery level calculation algorithm and a failure prediction algorithm for ESS optimization and stable operation. The proposed algorithm calculates the correct battery level by accumulating the current amount in real-time when the battery is charged and discharged, and calculates the battery failure by using the voltage imbalance between battery cells. The proposed algorithms can predict the exact battery level and failure required to operate the ESS optimally. Therefore, accurate status information on ESS battery can be measured and reliably monitored to prevent large accidents.

A Study on the Analysis of Related Information through the Establishment of the National Core Technology Network: Focused on Display Technology (국가핵심기술 관계망 구축을 통한 연관정보 분석연구: 디스플레이 기술을 중심으로)

  • Pak, Se Hee;Yoon, Won Seok;Chang, Hang Bae
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.2
    • /
    • pp.123-141
    • /
    • 2021
  • As the dependence of technology on the economic structure increases, the importance of National Core Technology is increasing. However, due to the nature of the technology itself, it is difficult to determine the scope of the technology to be protected because the scope of the relation is abstract and information disclosure is limited due to the nature of the National Core Technology. To solve this problem, we propose the most appropriate literature type and method of analysis to distinguish important technologies related to National Core Technology. We conducted a pilot test to apply TF-IDF, and LDA topic modeling, two techniques of text mining analysis for big data analysis, to four types of literature (news, papers, reports, patents) collected with National Core Technology keywords in the field of Display industry. As a result, applying LDA theme modeling to patent data are highly relevant to National Core Technology. Important technologies related to the front and rear industries of displays, including OLEDs and microLEDs, were identified, and the results were visualized as networks to clarify the scope of important technologies associated with National Core Technology. Throughout this study, we have clarified the ambiguity of the scope of association of technologies and overcome the limited information disclosure characteristics of national core technologies.