• Title/Summary/Keyword: 정보보호 지원 정책

Search Result 141, Processing Time 0.029 seconds

Analyzing the Factors Affecting the Successful Deployment of the Open Source Based Institutional Repositories (오픈액세스기반 기관리포지터리 성공에 미치는 요인 분석)

  • Hwang, Hye-Kyong;Lee, Jee-Yeon
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.4
    • /
    • pp.35-58
    • /
    • 2009
  • One of the main goals of providing open access is to vitalize the exchange of academic information by allowing access to the scholarly research outputs for everyone without the legal, financial, and technical barriers. We regard the use of the institutional repository as an open access enabler. In this study, we tried to make the factors, which enable the successful deployment of the institutional repository, explicit. We utilized literature review and case studies to generate the potential success factors for the institutional repository deployment. We verified the factors by having in-depth interviews with the subject matter experts. The resulting factors were organized as organizational, political, and technical ones. The organizational factors included the strong open access support by the organization heads. Under the policy factors, a number of issues such as selection of the core contents, minimum quality control, protection of the copyrights, forming supporting groups through active advertising, long-term preservation, incentive, and mandate, were included. The technical factors included easy submission, support for interoperability, and support for the publication activities.

GII구축에 따른 정보통신산업의 대응전략 - 산업조직적 시각에서 -

  • 전영서
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 1998.05a
    • /
    • pp.16-16
    • /
    • 1998
  • 기술혁신과 제도변혁의 와중에서 미국을 위시하여 우리나라, 일본, EU, 싱가포르등 세계 각국들은 경쟁적으로 2010년까지 초고속정보망을 구축할 것을 계획하고 있다. 더나아가서 미국 정부는 세계적인 초고속정보망 (Global Information Infrastructure: GII)을 구축하는 것을 계획하고 있다. GII 추진을 주도하고 있는 미국을 영상, 소프트웨어, 방송, 게임 등의 각종 멀티미디어 서비스의 절대적 경쟁력을 미국에서 뿐만 아니라 GII를 통해 세계시장으로 확대, 보호하겠다는 전략적 의미를 갖고 있다고 볼 수 있다. 미국의 GII 추진전략에 대응하여 일본은 AII 라는 아시아판 초고속통신망 구축과 개방화를 제안하였으며, 우리나라 정부는 APII라는 이름으로 아시아, 태평양지역 국가들을 대상으로 하는 초고속통신기반을 구축할 것을 제시하였다. 한국의 APII전략은 아시아, 태평양 지역 중심으로 한국의 국가적 위상을 제고하는 한편 우리나라 기업의 국제진출을 위한 전진기지로서의 활용측면에서 유효하다는 의미로서 제시하였다. 그러나, 우리나라가 제시한 APII의 청사진은 세계 정보통신시장을 중심으로 볼 때 경쟁력을 갖고 있는 정보통신부분이 반도체이외에는 전무하다는 측면에서 잘못하면 APII라는 전략은 미국이나 일본의 정보통신망 구축에 이용당할 가능성이 높은 무의미한 전략적 의미를 갖고 있는 것으로 보인다. 따라서 본 연구에서는 미국이 구축하고자 하는 GII체제와 병행하여 우리나라 정보통신산업을 육성, 발전시키기 위한 대응전략이 어떤 방향으로 전개되어야 할 것인지를 제시하기 위하여 GII가 갖고 있는 전략적 의미를 산업조직측면에서 살펴보고자 하였다. GII구축으로 인하여 세계의 정보통신 대기업은 초대기업으로 성장할 수 있는 기회이지만 중소기업 역시 대기업으로 성장할 수 있는 기회이다. 따라서 우리나라 정부는 정보통신산업정책을 초고속망 구축위주인 대기업 중심체제에서 중소기업이 참여 가능한 통신기기산업이나 멀티미디어 산업으로의 유인전환을 촉진할 필요가 있다. 다음으로 GII 구축에 따라 정보통신기업의 전략적 제휴 내지 합병이 활발히 촉진되고 있는 상황을 감안하여 볼 때 국내의 통신산업 역시 전략적 제휴 내지 합병이 가능할 수 있도록 정부규제를 완화할 필요가 있다. 그리고 정보통신서비스업체 역시 나름대로 독과점 산업인 통신기기업체내지 소프트웨어 산업으로의 진출이 가능할 수 있도록 상호진출을 허용할 필요가 있다고 본다. 이를 위해서 우리 나라 정부 역시 미국처럼 새로운 통신개혁법을 만들 필요가 있다. 새로운 통신개혁법의 핵심적인 사항으로서 첫째, 통신과 CATV간의 상호진입을 허용, 둘째, 통신사업자가 통신관련 기기산업에 참여할 수 있는 규제완화를 허용, 셋째, 유아단계에 있는 소프트웨어 및 컨테트산업을 육성하는데 산업육성책 수립 등을 적극적으로 추진하여야 할 것이다. 그리고 현재 국내 재벌기업들로 구성되어 있는 기반산업을 지원하는 기술개발 지원체제와 육성정책을 소프트웨어 및 컨텐트의 응용산업으로 개편할 필요성도 제시되며, 이를 위해 범부처 차원에서 소프트웨어 및 컨텐트 육성정책을 지원하는 종합적인 대책을 마련해야 한다고 본다.

  • PDF

Reinforcement Learning-Based APT Attack Response Technique Utilizing the Availability Status of Assets (방어 자산의 가용성 상태를 활용한 강화학습 기반 APT 공격 대응 기법)

  • Hyoung Rok Kim;Changhee Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1021-1031
    • /
    • 2023
  • State-sponsored cyber attacks are highly impactful because they are carried out to achieve pre-planned goals. As a defender, it is difficult to respond to them because of the large scale of the attack and the possibility that unknown vulnerabilities may be exploited. In addition, overreacting can reduce the availability of users and cause business disruption. Therefore, there is a need for a response policy that can effectively defend against attacks while ensuring user availability. To solve this problem, this paper proposes a method to collect the number of processes and sessions of defense assets in real time and use them for learning. Using this method to learn reinforcement learning-based policies on a cyber attack simulator, the attack duration based on 100 time-steps was reduced by 27.9 time-steps and 3.1 time-steps for two attacker models, respectively, and the number of "restore" actions that impede user availability during the defense process was also reduced, resulting in an overall better policy.

Access Control Middleware Prototype Design based T-RBAC for secure applications with MMDBMS (MMDBMS의 안전한 응용을 위한 T-RBAC 기반의 접근제어 미들웨어 프로토타입 설계)

  • Byun, Chang-Woo;Park, Seok;Choi, Wan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.260-262
    • /
    • 2003
  • 최근 인터넷 및 이동 통신이 발달하면서 많은 사용자를 동시에 서비스할 수 있는 고성능 메인 메모리 데이타베이스 관리 시스템에 대한 연구가 활발히 진행되고 있지만, 특정 응용에 한정되도록 개발됨으로써(ad-hoc designed system) 시스템의 범용성이 떨어질 뿐만 아니라, 고객 지향적 요구 사항을 적시에 반영할 수 있는 유연한 구조 및 다른 응용 분야로의 적용(customizing)이 어렵다. 특히, 정보 보안에 대한 문제를 해결하지 못하기 때문에 적용 영역의 확대에 걸림돌이 되고 있다. 본 논문은 접근제어에 초점을 두고 저장된 데이타에 대한 권한 없는 접근, 고의적인 파괴 및 변경으로부터 데이타베이스를 보호하여 고신뢰성을 추구하고, 다중 사용자들의 이질성을 해결하며 다양한 보안 정책을 유연하게 지원하는 고성능 메인 메모리 데이타베이스 관리 시스템을 위한 접근제어 미들웨어 시스템에 대한 프로토타입을 제시한다.

  • PDF

Prediction of solar power generation for power brokerage based on Federated Learning (연합학습 기반 전력 중개용 태양광 발전 예측)

  • Lee, Mirinae;Yeom, Sungwoong;Kim, Kyungbaek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.577-579
    • /
    • 2022
  • 최근 대두된 환경문제로 인해 다양한 재생 에너지의 실리적인 활용 방법에 귀추가 주목되고 있다. 특히 '그린뉴딜', 'K-RE100' 등 정부 주도의 정책으로 태양광 발전 시장 규모가 확대되면서, 소규모 발전 사업자의 태양광 발전 참여율도 매년 증가 추세를 보이고 있다. 이로 인해 소규모 발전 사업자의 수익을 산정하는 전력 중개 시스템의 태양광 발전 예측은 에너지 시장의 핵심요소로 부각되었다. 하지만 전력 중개용 태양광 발전 예측에는 기후의 간헐성으로 인한 예측 정확도 감소, 소규모 발전 사업자의 개인정보 보호 등 제약이 존재한다. 이 논문에서는 전력 중개용 태양광 발전 예측의 제약을 해소하고, 전력 중개 활성화를 지원키 위한 CNN-LSTM 기반 연합학습 기법을 제안한다.

A Study on Establishment and Operation of Airways Concerning Legal and Political Issues (항공로의 설정 및 운영상의 법적.정책적 문제에 대한 연구)

  • Kim, Maeng-Sern;Yoo, Kwang-Eui
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.6 s.84
    • /
    • pp.55-67
    • /
    • 2005
  • There are 24 airways in Incehon IFR, including 11 domestic routes and 13 international routes. The airways designated by ministry of Transportation and Construction are the routes for aircraft to fly being serviced by air traffic control system for flight safety. This study reviewed safety situation of existing permanent airways within Incheon IFR and temporary airways connecting North and South Korea. The study tried to identify the problems related to airway operation and to suggest solutions to the questionable area. The main findings are as follows: It is necessary to improve the existing normal airway systems and enlargement of the route. The airway A593 has to be upgraded to normal route. The temporary airways established to connect Seoul and Pyongyang also needs to be upgraded by air traffic control transfer agreement between two Koreas.

Regulatory Policy for China Game : Toward a class of flags and cartes (중국 게임 규제정책 : 기패류 게임을 중심으로)

  • Li, Li;Song, Seungkeun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.181-182
    • /
    • 2016
  • The game policy in China takes the way of promoting the development of domestic enterprises through protecting the growth of those. In order to improve the development of domestic game industry, it will maintain the policy that restrict the import of overseas game. However, as to the domestic enterprise, it will develop the aid policy in the form of encouraging overseas export. For the characteristics of wide audience, long life term and easy to be developed, the class game of flags and cartes has become a very significant field of game industry. But for the gamble characteristics of the class game of flags and cartes, it also becomes the center for the government of making regulations and policies. This research aims to analysis the china game policies for the class game of flags and cartes and to find the strategy to entry into the china.

  • PDF

A Preliminary Study on Domestic Embracement and Development Plan Regarding UNESCO World Heritage Programme (유네스코 세계유산 제도의 우리나라 문화재 정책에의 수용과 발전방안에 대한 시론적 연구)

  • Kang, Kyung Hwan;Kim, Chung Dong
    • Korean Journal of Heritage: History & Science
    • /
    • v.43 no.1
    • /
    • pp.56-85
    • /
    • 2010
  • UNESCO World Heritage Programme was introduced following the adoption of Convention Concerning the Protection of the World Cultural and Natural Heritage by the General Conference of UNESCO in 1972 in order to protect cultural and natural heritage with superb value for all mankind. Despite its short history of less than 40 years, it has been evaluated as one of the most successful of the cultural area projects of UNESCO with 890 world heritage registered worldwide. For systematic protection management of World Heritage, UNESCO, through systemization of registration, emphasis on the importance of preservation management plan, institutionalization of monitoring, and operation of World Heritage Fund, has utilized World Heritage Programme not just as a means of listing excellent cultural properties, but as a preservation planning tool, and accordingly, such policies have had a significant influence on the cultural heritage protection legislations of numerous nations. Korea has ratified World Heritage Convention in 1988, and with the registration of the Royal Tombs of the Joseon Dynasty in 2009, it has 9 World Heritage Sites. Twenty years have passed since Korea joined the World Heritage Programme. While World Heritage registration contributed to publicity of the uniqueness and excellence of Korean cultural properties and improvement of Korea's national culture status, it is now time to devise various legislative/systematic improvement means to reconsider the World Heritage registration strategy and establish a systematic preservation management system. While up until now, the Cultural Properties Protection Law has been amended to arrange for basic rules regarding registration and protection of World Heritage Sites, and some local governments have founded bodies exclusive for World Heritage Site management, a more fundamental and macroscopic plan for World Heritage policy improvement must be sought. Projects and programs in each area for reinforcement of World Heritage policy capacity such as: 1) Enactment of a special law for World Heritage Site preservation management; 2) enactment of ordinances for protection of World Heritage Sites per each local government; 3) reinforcement of policies and management functionality of Cultural Heritage Administration and local governments; 4) dramatic increase in the finances of World Heritage Site protection; 5) requirement to establish plan for World Heritage Site preservation protection; 6) increased support for utilization of World Heritage Sites; 7) substantiation and diversification of World Heritage registration; 8) sharing of information and experiences of World Heritage Sites management among local governments; 9) installation of World Heritage Sites integral archive; 10) revitalization of citizen cooperation and resident participation; 11) training specialized resources for World Heritage Sites protection; 12) revitalization of sustainable World Heritage Sites tourism, must be selected and promoted systematically. Regarding how World Heritage Programme should be domestically accepted and developed, the methods for systemization, scientific approach, and specialization of World Heritage policies were suggested per type. In the future, in-depth and specialized researches and studies should follow.

The Co-Occurrence of Domestic Violence and Child Maltreatment : Perspective from Child Protection Services (아동학대와 가정폭력의 중복발생 연구 : 아동보호서비스의 관점)

  • Kim, Kihyun;Kim, Yong-Hoi;Kim, Kyung-Hee
    • Korean Journal of Social Welfare Studies
    • /
    • v.49 no.4
    • /
    • pp.221-249
    • /
    • 2018
  • This study examined the co-occurrence of child maltreatment and domestic violence in South Korea, using the administrative data from Korean Child Protection Services. Existing literature showed that the co-occurrence rate was high and that the co-occurrence was important in prevention and intervention for child maltreatment. However, few studies have investigated the co-occurrence of child maltreament and domestic violence in South Korea. None of the studies have examined the co-occurrence from the perspective of child protective services. This study analyzed the rate of co-occurrence among abusive families involved with Korean Child Protective Services and examined the relationship between domestic violence and child maltreatment. Results showed that 21.4% of the abusive families had also experienced domestic violence. Various characteristics(i.e., detailed abuse characteristics, psychosocial characteristics of perpetrators) differed between co-occurrence families and maltreatment-only families. Domestic violence was a significant predictor of child maltreatment, but the detailed relationships differed according subtypes of maltreatment. Based on the results, implications for theory and service integration between services for domestic violence victims and child protective services were discussed.

A Study on the Dynamic Encryption Manager for Improved Timeliness in Secure Real-Time Database Systems (보안 실시간 데이터베이스 시스템에서 시간성 향상을 위한 동적 암호화 관리자에 관한 연구)

  • Lee, Soon-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.210-216
    • /
    • 2005
  • In many real-time applications, security is another important requirement, since the secure real time database system maintains sensitive information to be shared by multiple users with different levels of security clearance or to be attacked by hackers with ill will. Encryption policies are necessary for the security of secure real-time database systems in addition to the existing security methods, too. However, there has not been much work for the encryption policies in secure real-time database systems, although sensitive information must be safeguarded in real-time systems as well. In this paper, we propose a encryption manager for the purpose of solving the encryption policies of the secure real-time database systems. What is important in the encryption policies of secure real-time database systems is security and timeliness. A significant feature of the proposed encryption manager is the ability to dynamically adapt a encryption algorithm that consider transaction deadline and security level.