• Title/Summary/Keyword: 지식경영모델

Search Result 273, Processing Time 0.019 seconds

Database Security System supporting Access Control for Various Sizes of Data Groups (다양한 크기의 데이터 그룹에 대한 접근 제어를 지원하는 데이터베이스 보안 시스템)

  • Jeong, Min-A;Kim, Jung-Ja;Won, Yong-Gwan;Bae, Suk-Chan
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1149-1154
    • /
    • 2003
  • Due to various requirements for the user access control to large databases in the hospitals and the banks, database security has been emphasized. There are many security models for database systems using wide variety of policy-based access control methods. However, they are not functionally enough to meet the requirements for the complicated and various types of access control. In this paper, we propose a database security system that can individually control user access to data groups of various sites and is suitable for the situation where the user's access privilege to arbitrary data is changed frequently. Data group(s) in different sixes d is defined by the table name(s), attribute(s) and/or record key(s), and the access privilege is defined by security levels, roles and polices. The proposed system operates in two phases. The first phase is composed of a modified MAC (Mandatory Access Control) model and RBAC (Role-Based Access Control) model. A user can access any data that has lower or equal security levels, and that is accessible by the roles to which the user is assigned. All types of access mode are controlled in this phase. In the second phase, a modified DAC(Discretionary Access Control) model is applied to re-control the 'read' mode by filtering out the non-accessible data from the result obtained at the first phase. For this purpose, we also defined the user group s that can be characterized by security levels, roles or any partition of users. The policies represented in the form of Block(s, d, r) were also defined and used to control access to any data or data group(s) that is not permitted in 'read ' mode. With this proposed security system, more complicated 'read' access to various data sizes for individual users can be flexibly controlled, while other access mode can be controlled as usual. An implementation example for a database system that manages specimen and clinical information is presented.

Simulation and Post-representation: a study of Algorithmic Art (시뮬라시옹과 포스트-재현 - 알고리즘 아트를 중심으로)

  • Lee, Soojin
    • 기호학연구
    • /
    • no.56
    • /
    • pp.45-70
    • /
    • 2018
  • Criticism of the postmodern philosophy of the system of representation, which has continued since the Renaissance, is based on a critique of the dichotomy that separates the subjects and objects and the environment from the human being. Interactivity, highlighted in a series of works emerging as postmodern trends in the 1960s, was transmitted to an interactive aspect of digital art in the late 1990s. The key feature of digital art is the possibility of infinite variations reflecting unpredictable changes based on public participation on the spot. In this process, the importance of computer programs is highlighted. Instead of using the existing program as it is, more and more artists are creating and programming their own algorithms or creating unique algorithms through collaborations with programmers. We live in an era of paradigm shift in which programming itself must be considered as a creative act. Simulation technology and VR technology draw attention as a technique to represent the meaning of reality. Simulation technology helps artists create experimental works. In fact, Baudrillard's concept of Simulation defines the other reality that has nothing to do with our reality, rather than a reality that is extremely representative of our reality. His book Simulacra and Simulation refers to the existence of a reality entirely different from the traditional concept of reality. His argument does not concern the problems of right and wrong. There is no metaphysical meaning. Applying the concept of simulation to algorithmic art, the artist models the complex attributes of reality in the digital system. And it aims to build and integrate internal laws that structure and activate the world (specific or individual), that is to say, simulate the world. If the images of the traditional order correspond to the reproduction of the real world, the synthesized images of algorithmic art and simulated space-time are the forms of art that facilitate the experience. The moment of seeing and listening to the work of Ian Cheng presented in this article is a moment of personal experience and the perception is made at that time. It is not a complete and closed process, but a continuous and changing process. It is this active and situational awareness that is required to the audience for the comprehension of post-representation's forms.

The Effect of Technology Startups' Value Chain Internal and External Network Activities on Competitive Advantage Through Dynamic Capabilities (기술창업기업의 가치사슬내부 및 외부 네트워크 활동이 동적역량을 매개로 경쟁우위에 미치는 영향)

  • Hong, Inki;Kim, Hyung-Jun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.5
    • /
    • pp.17-30
    • /
    • 2022
  • It has been verified in several studies that dynamic capabilities has a very important effect on the competitive advantage of technology startups. And the network has an important influence on this dynamic capability. This is even more important for start-ups that lack the resources and knowledge. Networks that directly and significantly affect dynamic capabilities have been studied mainly the value chain internal. However, network activities of start-ups are conducted not only with the value chain internal networks but also with the value chain external networks. Therefore, it is necessary to study the effect of the value chain internal and external network activity of start-ups on the dynamic capabilities, but prior studies are lacked. In this study, We make a model that encompass the value chain internal and external network for technology startups, and a study was conducted to demonstrate the effect on dynamic capabilities and competitive advantage. As a result of the study, value chain internal network activity directly and significantly affected dynamic capabilities, and value chain external network activity did not directly significantly affect dynamic capacity. And dynamic capabilities had a significant effect on competitive advantage. As confirmed through additional research, value chain external network activity affects value chain internal network activity, and through this, dynamic capabilities are strengthened, and positively affect competitive advantage.. The intensity of value chain external network activity was not significant to dynamic capabilities and the diversity of value chain external network activity had a significant effect on the competitive advantage by double mediating the value chain internal network activity and dynamic capability. Through this study, it is confirmed that the value chain internal networks is important in order for startups to strengthen their dynamic capabilities and increase their competitive advantage, and that both strong and diversified the value chain internal networks positively affects competitive advantage by enhancing dynamic capabilities.