• Title/Summary/Keyword: 항목 도출

Search Result 1,717, Processing Time 0.029 seconds

Determination of Instream Flow Requirement for Small Mountainous Watershed Using SWAT (SWAT을 이용한 산지 소유역의 하천유지유량 산정방안)

  • Lee, Kil-Seong;Chung, Eun-Sung;Shin, Mun-Joo;Kim, Young-Oh
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.814-818
    • /
    • 2006
  • 본 연구에서는 안양천 중상류 유역에 대해 SWAT 모형을 이용하여 현재(2000년)의 토지이용 및 지하수 취수량(2000년)을 토대로 유황곡선을 도출하고 개발이전의 토지이용(1975년)과 지하수 취수가 전혀 없는 이상적인 상태에서 유황곡선을 도출하여 비교분석하였다. 또한 기존의 갈수량과 항목별 필요유량을 비교하여 큰 값으로 하천유지유량을 설정한 것과 본 연구에서 수행한 유황들을 비교하였다. 그 결과 오전, 삼성, 삼막, 수암천의 경우 현재의 상태와 이상적인 상태의 갈수량이 전혀 변화하지 않음을 보였으며 삼성, 삼막천은 두 경우 모두 갈수량이 0임을 확인할 수 있었다. 이는 대상유역의 유역면적이 작은 지방2급 하천일 뿐만 아니라 경사가 급한 산간지역이 대부분을 이루어서 개발 전에도 기저유출이 많지 않았기 때문이다. 또한 하천유지유량을 항목별 필요유량으로 산정한 경우는 모든 유역에서 이상적인 상황의 저수량보다 큰 값을 보였다. 따라서 지방2급 하천과 같이 유역면적이 작거나 산지하천의 경우에도 일률적으로 갈수량이나 항목별 필요유량을 비교하여 큰 값으로 하천유지유량을 설정하기보다는 수문모의모형을 이용하여 대상유역에 대해 자연적인 상황에서의 갈수량 또는 저수량 등 다른 적절한 방안을 사용하는 것이 바람직하다.

  • PDF

A study on the Development of Personnel Security Management for Protection against Insider threat (내부 정보보호를 위한 인원보안 관리 방안 연구)

  • Cha, In-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.4
    • /
    • pp.210-220
    • /
    • 2008
  • Insider threat is becoming a very serious issue in most organizations and management is responsible for security implementation. This study is to develop a personnel security management indicators in the areas of Personnel Assurance, Personnel Competence, and Security Environment and protection against insider threats. In this study, the information security management system and related papers are examined by reviewing the existing researches and cases. Proposed indicators are verified by pilot test, empirically analyzed to expose experts' perception and the validity, importance, and risk level of each indicators through a questionnaire. Result were encouraging, but additional study focused on personnel security management using factor analysis is needed in the future.

  • PDF

결제카드산업 데이터보안표준(PCI DSS) 적용방안에 대한 고찰

  • Kim, Dong-Guk;Jang, Sung-Yong
    • Review of KIISC
    • /
    • v.18 no.4
    • /
    • pp.66-75
    • /
    • 2008
  • 신용카드 및 직불카드 회사들의 연합체인 PCI SSC(PCI Security Standards Council)는 2004년 가정이나 소매상과 같은 소규모 환경에서 고객들의 금융 정보 유출을 방지하기 위한 목적으로 PCI DSS가 제정되었다. 국내에서는 2007년부터 PCI DSS 보안감사제도가 시행되었으며 유일하게 PCI DSS 보안감사자를 보유한 (주)에이쓰리시큐리티사가 가맹점1) 및 PG/VAN사(社)를 대상으로 PCI DSS 보안감사를 실시하였다. 본 연구에서는 2007년 한 해 동안 국내의 PCI DSS 보안감사를 수행하면서 요구사항에 만족하지 못하는 항목들에 대한 사례를 분석함으로써 국내 PCI DSS 보안감사 도입의 현 주소를 파악하고 이에 대한 개선안을 도출하여 보안감사에 보다 유연하게 대처할 수 있도록 하고자 한다. 2007년 한해 국내 보안감사 실시 결과 PCI DSS 보안감사 대상자의 요구사항 준수율은 평균 81%로 측정되었으며, 전체 233개의 요구사항 중 미적용으로 평가된 항목은 평균 38.7개로 나타났다. 전체적인 평균으로 따져봤을 경우 어느 정도 양호한 수준으로 판단할 수도 있으나 피감사 기업의 업태나 사전준비의 유무에 따라 많은 격차가 있었다. 특히, 기반이 튼튼한 PG사나 VAN사에 비해 신규로 등록되어 사업규모가 작거나 타사에 비해 카드결제산업이 차지하는 사업비중이 작은 곳은 PCI DSS 보안감사의 요구사항을 준수하는데 어려움을 겪고 있는 것으로 나타났다. 따라서, 본 연구에서는 PCI DSS 보안감사를 통해 도출된 미적용 사항 중 가장 많은 미적용율을 나타낸 10가지 항목에 대하여 분석하고 이에 대한 대안을 제시함으로써 향후, PCI DSS의 요구사항을 기업환경에 맞게 적용하기 위해 효율적인 가이드로써 활용되었으면 하는 바램이다.

BMT Derivation of Evaluation Item about Anti-DDoS SW (Anti-DDoS SW BMT 평가항목 도출)

  • Shin, Suk-Jo;Lee, Jae-Guen;Jo, In-June;Shin, Seok Kyoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.375-378
    • /
    • 2009
  • DDoS attacks make people can't using normal internet service, because DDoS attacks cause exhaustion of network bandwidth or exhaustion of computer system resources by using many personal computers or servers which already infected computer virus from hackers. Recent DDoS attacks attack government brach, financial institution, even IT security company. IT security companies make Anti-DDoS product for defense from DDoS attack. But, There is no standard for BMT of Anti-DDoS product. In this dissertation, Anti-DDoS product quality characteristics of the survey analysis to evaluate them by comparing the assessment items were derived.

  • PDF

Determination of AHP-based factor weights for quantification of regional mega-drought resilience (지역별 메가가뭄 복원력 정량화를 위한 AHP기반 인자 가중치 결정)

  • Lee, Chanwook;Moon, Gihoon;Yoo, Do Guen
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.361-361
    • /
    • 2021
  • 가뭄의 경우 타 자연재난에 비해 발생경로, 피해범위, 발생기간 등이 매우 다양해 다각적인 측면에서의 대응책 마련이 필요하다. 따라서, 극한가뭄에 대비한 지자체별 가뭄 역량 평가를 수행하는 것은 재난관리에 있어서 최우선이라고 할 수 있다. 현재 국내외적으로 가뭄과 관련된 지역적 복원력을 평가한 사례는 매우 적다. 가뭄은 지진, 홍수 등과 같은 타 자연재난에 비하여 지속기간이 길고, 그 지속기간에 따라 피해의 영향 또한 파급력이 달라지므로 복원력 산정을 위한 항목, 복원력 곡선의 저하 형태 및 양상 역시 가뭄의 특성에 맞춰 도출되어야 한다. 본 연구에서는 지자체별 극한가뭄에 대한 복원력 정량화를 위하여 가뭄과 관련된 내구성, 대체성, 신속성, 자원동원력의 세부인자를 정성인자와 정량인자로 구분하여 총 18개 항목으로 구성하였다. 구성된 18가지 항목이 정량인자 뿐만 아니라 정성인자로 구성됨에 따라, 모든 인자를 동일한 가중치로 평가할 경우 최종결과가 상대적 중요도의 미 고려로 인해 왜곡될 가능성이 존재한다. 따라서 계층적분석기법(AHP, Analytic Hierarchy Process)을 통해 내구성, 대체성, 신속성, 그리고 자원동원력에 대한 가중치와 내구성, 대체성, 그리고 신속성에 대한 세부 지표별 가중치를 도출하여 지역별 메가가뭄 복원력을 정량화 하였다. 분석결과를 동일한 가중치를 적용한 결과와 비교분석하였으며, 과거 가뭄사례를 통해 검토하였다.

  • PDF

Decision Support Model for Establishing Plans of Gamyeong Restoration Project (감영 복원사업의 계획수립을 위한 의사결정 지원 모델 구축)

  • Kim, Jong-Hun;Haan, Chan-Hoon;An, Dai-Whan;Cha, Minsu
    • Journal of the Korea Institute of Building Construction
    • /
    • v.23 no.6
    • /
    • pp.851-862
    • /
    • 2023
  • This study introduces an objective and systematic framework for prioritizing buildings in the Gamyoung restoration project using a decision-support model. This model integrates evaluation criteria derived from a comprehensive literature review, refined through the Delphi method, and weights assigned via an Analytic Hierarchy Process(AHP) survey. Each building project is scored against these criteria to ascertain its priority for restoration, thereby facilitating informed decision-making for budget allocation in restoration projects. The effectiveness of the decision-support model was validated through a case study and expert consultations, demonstrating its practical utility in formulating concrete restoration project plans.

Development and Feasibility of Indicators for Ecosystem Service Evaluation of Urban Park (도시공원의 생태계서비스 평가지표 개발 및 측정가능성 검토)

  • Kim, Eunyoung;Kim, Jiyeon;Jung, Hyejin;Song, Wonkyong
    • Journal of Environmental Impact Assessment
    • /
    • v.26 no.4
    • /
    • pp.227-241
    • /
    • 2017
  • A human in urban areas has depended on ecosystem for well-being, so it is important to evaluate urban ecosystem services which contribute significantly to human well-being. In this study we classified ecosystem functions and set indicators used for evaluating ecosystem services of urban park by Delphi method. As a result, it derived 12 items and 14 indicators of ecosystem services to evaluate them such as vegetable garden, canopy cover, biodiversity, and educational programs. Based on the derived evaluation indicators, the feasibility of the indicators was examined by applying to two urban parks, Maetan park and Seoho-Ggotme park, in Suwon City. We also suggested strategies to improve each ecosystem services based on the results of evaluation. It is significant to recognize unknown services in urban parks. The results can be used for improving urban ecosystem services consistently in response to current rapid urbanization. In the future, the city should make a master plan on ecosystem service on urban area, beyond urban park, considering both of quality and quantity.

Improvement of the Checklist for Residential Housing's Crime Prevention Accreditation Assessment (주거시설에 대한 CPTED 평가인증 기준 개선방안 연구)

  • Park, Hyeon-Ho;Kim, Kang-Il;Cho, Joon-Tag
    • Korean Security Journal
    • /
    • no.55
    • /
    • pp.117-141
    • /
    • 2018
  • Police crime statistics report that residential housing such as apartment, low rise, detached houses is the second most vulnerable to crime, which is closely followed by the number of street crimes. Also residential houses are often exposed to quality-of-life crime, e.g burglary. It threatens the basic human rights of house residents in terms of safety and comfort within the urban living environment. This study examines related precedent studies regarding the vulnerability of residential housing including studios, multi-family housing from the viewpoint of crime prevention through environment design(CPTED), extracted the elements and items suitable for the safety of residential facilities and the certification evaluation indicators and check items to be the basis for the checklist are derived. Based on these evaluation indicators and inspection items, we conducted on-site surveys of residential facilities in three areas of Seoul, Yongin and Asan, and the final draft of the checklist was revised based on the results of the field survey. There are 43 items on the 7 fields of evaluation in the final version of checklist, 11 items in the management and operation, 20 items in the surveillance, 7 items in the access control, 1 item in the territoriality, 2 items in the activity support, and 2 items in the security and safety facilities. In addition, various points of interest were added to allow the administrator of the residential facility to earn points for special measures taken for safety. This checklist can be appropriately modified and utilized in consideration of the characteristics of each facility. Korean national police agency has CPOs to check the residential facilities in their jurisdiction using checklists and to certify excellent facilities with high level of safety.

An Audit Method on Information System Audit using Delphi Method - Based on Hyperledger Fabric (델파이기법을 이용한 감리점검항목 도출 방안 - 하이퍼레저 패브릭 기반으로)

  • Lee, Youngjoo;Park, Sooyong
    • Journal of Software Engineering Society
    • /
    • v.29 no.2
    • /
    • pp.7-12
    • /
    • 2020
  • A project to establish an information system with a project cost of more than 500 million won at a local public firm is subject to the Information System Audit (hereinafter referred to as IS Audit), and the IS Auditor shall conduct audit according to the audit criteria. Recently, as blockchain technology has been applied to various fields such as manufacturing, healthcare, distribution, and public sectors beyond the financial industry, the development of systems that apply blockchain technology is increasing. The use of Hyperledger Fabric, a private blockchain, is on the rise to utilize blockchain technology in public firms and private firms. However, the newly emerging blockchain-based system is not sufficient to carry out auditing with existing audit check items, so it has no choice but to make and use audit items individually. Therefore, a need for verified audit items for systems that base on blockchain technology has emerged. In this study, we customized the Delphi process to derive audit items suitable for the system development project using the blockchain technology, and verified the completeness and accuracy of the audit items derived through a survey by the IS Auditor. This research will be of direct help to the IS Auditor, and it is expected that operators and organizers who provide services through the blockchain-based system will also contribute to improving the quality of the system.

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.