• Title/Summary/Keyword: 지식기반 관리

Search Result 1,134, Processing Time 0.028 seconds

A Method of Establishing the National Cyber Disaster Management System (국가 사이버재난관리 시스템 구축 방안)

  • Kim, Sang-Wook;Shin, Yong-Tae
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.351-362
    • /
    • 2010
  • In Korea, national information infrastructure has been grown well because of the rapid growth and supply of Internet, but threats of cyber terror and cyber war are also increasing. Cyber attacks on knowledge information society threaten industry, economy and security. Major countries realize that cyber attacks can cause national heavy loss. So, they are trying to adopt policy on their cyber safe. And natural environmental crisises are increasing around the world. Countries such as India and Philippine in which tsunami, typhoon and earthquake are often occurring have national systematic disaster management system that can prevent and recover. We need systematic management for prevention and recovery from cyber terror, and need to establish national cyber disaster management system. Therefore, in this paper, we analyze major countries's cyber security policy and suggest a method of establishing the national cyber disaster management system.

The Study on the Improvement Policy of the Pre and Post Regulation System of Radio Station (무선국 관리 사전규제 개선과 사후관리 효율화 방안에 대한 연구)

  • Kim, Ho-Yeong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.5
    • /
    • pp.745-758
    • /
    • 2022
  • As the unlimited natural source of a country, radio waves are widely being used in the daily life toward knowledge based information society. Therefore it is necessary to provide a long term policy of radio waves management policies based on market situation to cope with rapidly changing wireless technology and effective use of radio resources. Literary survey and analysis were accomplished for the rules and regulations in the radio station approval system and post-approval policies for mobile communication service. In conclusion, this study propose an blanket radio approval policy as well as self declaration of conformity(SDoC) of radio waves technical regulation and advanced radio inspection procedure. This study has significance in providing reference for introducing deregulation policy in the radio communication imdustry.

A Integrated VOC Management Schema in Large-Scale Manufacturing Companies: A Case Study on Implementation for Construction Equipment Division in 'H' Heavy Industry (대규모 제조업에서의 통합 VOC 관리 방안 및 시스템 구축: 'H' 중공업 건설장비 부문 적용 사례)

  • Jang, Gil-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.8
    • /
    • pp.127-136
    • /
    • 2009
  • Voice of the customer(VOC) is a term used in business and information technology(IT) to describe the process of capturing a customer's requirements in enterprises or various organizations. Recently, in order to satisfy customer's needs, enterprises try to utilize VOC at recurrence prevention of problems and their improvement activities, planning and development of product/service by processing, storing, and analyzing VOC. Until now, VOC management systems are introduced around service industries such as hotel business and insurance/financial business, etc. This paper proposes an integrated management scheme of VOC which are captured by various communication channels and describes a case of implementing an integrated VOC management system on the basis of the proposed scheme for the large-scale manufacturing company. By the implemented system, VOC are stored and utilized as the important knowledge assets of enterprises.

A Study on the Process for Web Domain Applications Development Based on the UML+Navigation Diagrma (UML+Navigation Diagram 기반 웹 도메인 응용 개발 프로세스에 관한 연구)

  • Kim, Haeng-Kon;Shin, Ho-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.9
    • /
    • pp.2846-2856
    • /
    • 2000
  • Recently, according to the rapid development of web technology, a lot of applications based on web techniques have been developed. However, most of web applications have been developed relying on knowledge and experiences of the developer without systematic process. Web Applications are seldom developed in isolation. For web application designers, the simple and semantically rich methodology is needed to improve design and development process. In this paper, we propose a new development process methodology to improve low level technology based application development process which do not provide high level abstraction. We also suggest a new methodology to construct applications based on web. We describe a systematic web application development process by using Navigation Diagram as a analysis, design modeling method to develop web application with productivity and Quality. We apply the new development process to the EPBS(Electronic Problem Bank System) as examples. Web application development process proposed in this thesis can be maintained through reverse development, because it can be defined as high level abstraction for modeling. It is very easy to be understood as a process based on models. Also, analysis and design models can be reused as useful component whenever similar web application is developed.

  • PDF

Context-based Dynamic Access Control Model for u-healthcare and its Application (u-헬스케어를 위한 상황기반 동적접근 제어 모델 및 응용)

  • Jeong, Chang-Won;Kim, Dong-Ho;Joo, Su-Chong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.493-506
    • /
    • 2008
  • In this paper we suggest dynamic access control model based on context satisfied with requirement of u-healthcare environment through researching the role based access control model. For the dynamic security domain management, we used a distributed object group framework and context information for dynamic access control used the constructed database. We defined decision rule by knowledge reduction in decision making table, and applied this rule in our model as a rough set theory. We showed the executed results of context based dynamic security service through u-healthcare application which is based on distributed object group framework. As a result, our dynamic access control model provides an appropriate security service according to security domain, more flexible access control in u-healthcare environment.

Design of knowledge search algorithm for PHR based personalized health information system (PHR 기반 개인 맞춤형 건강정보 탐사 알고리즘 설계)

  • SHIN, Moon-Sun
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.191-198
    • /
    • 2017
  • It is needed to support intelligent customized health information service for user convenience in PHR based Personal Health Care Service Platform. In this paper, we specify an ontology-based health data model for Personal Health Care Service Platform. We also design a knowledge search algorithm that can be used to figure out similar health record by applying machine learning and data mining techniques. Axis-based mining algorithm, which we proposed, can be performed based on axis-attributes in order to improve relevance of knowledge exploration and to provide efficient search time by reducing the size of candidate item set. And K-Nearest Neighbor algorithm is used to perform to do grouping users byaccording to the similarity of the user profile. These algorithms improves the efficiency of customized information exploration according to the user 's disease and health condition. It can be useful to apply the proposed algorithm to a process of inference in the Personal Health Care Service Platform and makes it possible to recommend customized health information to the user. It is useful for people to manage smart health care in aging society.

The Cultural Circuit of Capital and the Evolution of Regional Development Policy in Korea: A New Form of Managerialist Governance in Action? (자본의 문화적 순환과 한국 지역발전 정책의 진화: 새로운 관리주의 거버넌스 형태의 등장?)

  • Lee, Jae-Youl
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.25 no.2
    • /
    • pp.237-253
    • /
    • 2022
  • This article offers an account of how regional development policy in Korea has evolved under the influence of actor-networks comprising the cultural circuit of soft capitalism. In so doing, the roles played by transnational actor-networks forged between global consulting firms and national business media are emphasized. For this discussion, the waning of spatial Keynesianism in the country is contextualized in the first place, with particular attention to changing planning goals of key regional development policies including consultancies, influential policy gurus (e.g., Michael Porter and Richard Florida), and local business media outlet Maekyong are found to be key movers and shakers in the transition. These empirical findings call for striking a balance between dominant structuralist accounts and emerging actor-oriented approaches, and also help shed a new light on the dualistic conceptualization of managerialist and entrepreneurial governance in a way that the latter may be a new form of the former.

정책기반의 새로운 공격 탐지 방법

  • 김형훈
    • Review of KIISC
    • /
    • v.13 no.1
    • /
    • pp.64-67
    • /
    • 2003
  • 컴퓨팅 환경이 보다 신뢰성 있고 실질적으로 사용되기 위해서는 보안이 필수적인 기능으로 요구된다. 알려진 공격의 패턴을 이용한 침입탐지는 공격자의 여러 가지 변형된 방법이나 새로운 공격 방법에 의해 쉽게 공격당할 수 있다. 또한 각각의 보안정책을 교묘히 회피하는 많은 공격 방법들이 수시로 개발되어 시도되고 있다. 따라서 침입에 성공하는 많은 공격들은 기존의 공격 패턴과 보안정책 사이의 허점을 이용하여 발생된다고 볼 수 있다. 본 논문에서 제안된 방법은 새로운 공격을 탐지하기 위해 이를 탐지하기 위한 특징값을 규칙집합을 통해 획득한다. 규칙집합은 알려진 공격, 보안정책과 관리자의 경험적 지식에 대한 분석을 통해 공격의 특징을 감지할 수 있도록 작성된다. 이러한 규칙집합에 의해 획득된 특징값들은 훈련단계에서 Naive Bayes 분류기법을 통해 공격에 대한 통계적 특징값으로 사용한다. 제안된 방법은 훈련단계에서 얻어진 공격에 대한 통계적 특징값을 이용하여 변형된 공격이 나 새로운 공격을 탐지할 수 있다.

A Case Study on the Construction of IT Architecture in KEIRS (정보기술아키텍처 구축 사례 연구: 한국교육학술정보원을 중심으로)

  • Han, Chang-O;Kim, Se-Hun;Kim, Hyoung-Jin
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.431-436
    • /
    • 2007
  • 교육정보화를 중추적으로 추진하고 있는 한국교육학술정보원에는 고객에게 양론의 서비스와 콘텐츠를 제공하기 위한 도구로써 정보기술아키텍처를 선택하였으며, 이를 통하여 향후 모든 정보학 사업의 기반과 더불어 정보시스템 관리체계로써의 역할인 IT Governance를 추진하기 위한 역할을 수행하고자 한다. '05년부터 추진해온 정보기술아키텍처 사업과 더불어 '97년 학술연구정보서비스 정보기술아키텍처 도입을 통해 축적된 지식과 경험을 토대로 향후 교육관련 기관 컨설팅을 추진하고자 하며, 본 연구와 관한 자세한 내용은 다음과 같이 논의하였다.

  • PDF

Fuzzy-based Trust Measurement for CoPs in Knowledge Management Systems (실행공동체를 위한 지식관리시스템에서의 퍼지기반 신뢰도 측정)

  • Yang, Kun-Woo
    • The Journal of Information Systems
    • /
    • v.19 no.4
    • /
    • pp.65-85
    • /
    • 2010
  • The importance of communities of practice(CoP) as an organizational informal unit for fostering knowledge transfer and sharing gains a lot of attention from KM researchers and practitioners. Since most of CoPs are formulated online these days, the credibility or trustworthiness of knowledge contents circulated within a certain CoP should be considered thoroughly for them to be fully utilized safely. Here comes the need for an appropriate trust measuring methodology to determine the true value of knowledge given by unknown people through an online channel. In this paper, an improved trust measuring method is proposed using new trust variables such as level of degrees derived from the relationships among community users. In addition, activeness, relevance, and usefulness of the knowledge contents themselves, which are calculated automatically using a text categorization technique, are also used for trust measurement. The proposed framework incorporates fuzzy set and calculation concepts to help build trust matrices and models, which are used to measure the level of trust involved in specific knowledge artifacts concerned.