• Title/Summary/Keyword: 핵심 지식 보안

Search Result 36, Processing Time 0.023 seconds

The Relationship between Financial Mydata Service Characteristics and Intention to Use: The Moderating Effects of Innovativeness and Technology Security (금융 마이데이터 서비스 특성과 수용의도의 관계: 개인혁신성과 기술적 보안성의 조절효과)

  • Changyong Sohn;Hyunsun Park;Sanghyun Kim
    • Knowledge Management Research
    • /
    • v.23 no.4
    • /
    • pp.133-157
    • /
    • 2022
  • As data becomes a new core resource with high attention, MyData service is spreading to various fields such as finance, medical care, and the public sector. However, research on the behavior of MyData service users is insufficient. Therefore, this study aims to empirically examine the effect of MyData service traits on value perception and acceptable behavior particularly in the financial sector where MyData service is most active. To this end, this study proposed a research model based on the literature. 295 survey responses were collected from individuals and analyzed using AMOS 26.0 for hypothesis testing. As a result of the analysis, it was found that self-information control, financial convenience, and personalized service had a significant effect on perceived value, and that perceived value had a significant effect on the intention to accept MyData service. Furthermore, this study examined the role of personal innovation and technological security in the relationship between variables by suggesting them as moderators. Results show that individual innovation was found to strengthen the relationship between two variables(self-information control and personalized service) and perceived value. Also, technological security was shown to strengthen the relationship between perceived value and intention to accept financial MyData services. The findings are expected to provide useful information to understand the factors affecting the acceptance of financial MyData service users and to understand the importance of individual innovation levels and technological security.

Studies of Leadership Education for Using NCS-Based Competency Curriculum (NCS 기반 역량 교육을 적용한 해군부사관과의 리더십 교육방안 연구 - 프로젝트와 프레젠테이션 교육을 중심으로 -)

  • Yu, Yong-tae
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.33-42
    • /
    • 2016
  • The goal of this paper is the presenting method that is based on the NCS-Based Competency Curriculum to use for teaching leadership education in petty officer area. The leadership education under NCS-Based Competency Curriculum is developing the overall usage of individual competency with varied knowledge and experience. The leadership education for potential petty officers is formed with four steps. At the first step, a check of personal competency. For the second step, designing a project format and setting a direction of the leadership curriculum. For the third step, a consolidation of theoretical and background knowledge through the project and presenting a training experience of problem analysis and resolution. For the fourth step, showing a result of the leadership education with another competency check. The leadership education under the NCS-Based Competency Curriculum is an essential way to develop leadership to the students who are participating petty officer education program at the college level. Finally, this research paper shows its research limitation and a way of hereafter research.

A Study on Constructing Knowledge Management Architecture in Semiconductor Business (반도체 산업에서의 Knowledge Management Architecture 구현에 관한 연구)

  • 장현성;이영중;안정삼;홍광희;양재영;최중민
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2002.11a
    • /
    • pp.193-202
    • /
    • 2002
  • 제품 개발 및 생산 관련 기술을 체계적으로 구축하고 재활용하는 것은 프로세스와 장치에 의존하는 반도체산업에서 매우 중요하다 그러나, 국내외 대부분 반도체 업체의 경우, 양적 위주로 성장해 온 나머지 정보의 생성에서부터 재활용, 폐기까지 일련의 기술 정보 관리 과정을 수작업과 종이 형태의 산출물에 의존하는 실정이다. 이런 현실은 제품 개발과 생산 기술 확보에 추가적인 리드 타임을 유발하여, 원가 및 조기 시장 선점의 부담으로 작용한다. 문제를 해결하고자 반도체 산업에 필요한 기술과 문서를 체계적으로 분류하고, 신제품 개발 정보 등, 핵심기술 정보의 대외 유출 방지를 위한 기술적, 제도적인 보안 체계를 정립하였다. 제품 개발 리드 타임 단축 및 생산성 향상을 위해 생산 시스템과 연동하여 제품, 프로세스 표준을 실시간으로 제공하는 한편, ERP와 연계된 EDMS를 설계, 구축하였다. 본 논문에서는 모델링 및 시스템을 구축하기 위한 방법과 결과를 논하고, 구축된 EDMS를 중심으로 새롭게 제시된 KMS 전략을 달성하기 위한 개념적인 모델을 제시하고자 한다.

  • PDF

Trandemark detection system using deep learning-based algorithms in a metaverse environment (메타버스 환경에서의 딥 러닝 기반 알고리즘을 활용한 상표권 탐지 시스템)

  • Ji-Eun Lee;Hyung-Su Lee;Yong-Tae Shin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.1-4
    • /
    • 2024
  • 코로나 19(Covide-19)이후 가상과 현실이 융·복합 되어 사회·경제·문학활동과 가치 창출이 가능한 메타버스가 차세대 핵심산업으로 부상하고 있다. 이에 자사 보유 기술, IP(Intellectual Property) 등을 활용하여 메타버스 플랫폼을 구축하고자 하는 기업들이 증가하여 지식재산권을 둔 법적 이슈들이 새롭게 나타나고 있다. 따라서 본 논문에서는 상표권 침해를 보호하기 위하여 딥 러닝 기반 객체 탐지모델인 YOLOv5 모델을 활용한 메타버스 환경에서의 상표권 탐지 시스템을 제안한다.

  • PDF

Educational Needs Analysis of General Security Jobs in Physical Protection Field using the DACUM Technique (DACUM기법을 활용한 물리적방호 분야 일반보안 직무의 교육 요구분석)

  • Lee, Jin Gu;Jung, Il Chan;Park, Min Ju
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.5
    • /
    • pp.234-246
    • /
    • 2021
  • The purpose of this study is to develop the main subjects of the job-based curriculum by deriving the job analysis results of general security job workers in the physical protection field responsible for responding to threats to nuclear materials and nuclear facilities. In the job analysis stage, FGI was conducted on 7 content experts to derive 8 duties and 55 tasks. In addition, knowledge and skills were drawn for each task. In the analysis of educational needs, surveys were conducted for workers in general security jobs to derive the top 25 educational priorities through t-test and Borich needs assess model. At the stage of selecting core tasks and organizing required/optional contents, 42 tasks, both above average or at least one of them, were derived as core tasks based on the result of evaluation of importance and difficulty ratings of 55 tasks through a questionaire. In addition, tasks applied to the top 25 rankings derived from Borich needs assess model were applied as the required contents when designing courses, and tasks which applied only one of them were selected as optional contents. At the stage of required/optional modules and educational contents, four required modules and five optional modules were derived by drifting similar tasks between the required and optional contents. Based on the above results, the study suggested academic and practical implications and future suggestions.

A Study on the Instructional Model utilizing Scratch for Introductory Programming Classes of SW-Major Students (SW전공자 프로그래밍 입문 수업의 스크래치 활용 수업 모형 연구)

  • KO, Kwangil
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.59-67
    • /
    • 2018
  • The programming language is a core education area of software that is becoming increasingly important in the age of the fourth industrial revolution, but it requires mathematical knowledge and logical thinking skills, so that many local private university and college students with low basic skills are having difficulties learning it. This problem occasionally causes SW-major students to lose interest and confidence in their majors during the introductory course of programming languages; making them change their majors, or give up their studies. In this study, we designed an instructional model using Scratch for educating C-language which is a typical programming introductory language. To do this, we analyzed the concepts that can be trained by Scratch among the programming concepts supported by C-language, and developed the examples of Scratch for exercising the concepts. In addition, we designed an instructional model, by which the programming concepts are first learned through Scratch and then C-language is taught, and conducted an experiment on the SW-major freshman students of a local private university to verify the effectiveness of the model. In the situation where SW education is becoming common, we expect that this study will help programming language education of security IT students.

  • PDF

A Study on Feature-Factors Extraction for Fingerprints Recognition (지문인식을 위한 특징요소 추출에 관한 연구)

  • Roh, Jeong-Seok;Jeong, Yong-Hoon;Choi, Young-Kyoo;Lee, June-Hwan;Rhee, Sang-Burm
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05a
    • /
    • pp.687-690
    • /
    • 2003
  • 지식 정보화 시대에 들어서면서부터 정보는 개인이나 일부 기관에 국한됨이 없이 중요시되고 있지만, 그 경계는 나날이 모호해지고 정보의 양은 급속하게 늘어가고 있는 것이 오늘날의 현실이다. 이러한 시대적 환경은 보안의 중요성이 크게 부각되어 생체인식 기술에 대한 관심을 높아지게 만들었다. 생체인식(Biometrics)분야 중에서도 지문 인식(Recognition)은 많은 연구가 이루어졌으나 개선할 점이 여전히 남아있다. 특히, 정확성 및 속도향상이라는 측면이 그렇다고 할 수 있겠다. 본 논문에서는 기존의 지문 인증(Authentication)시스템의 지문 영상(Image)의 식별 능력을 증가시키고 다수의 지문 영상에서도 좋은 결과를 가져올 수 있는 고유한 특징이 될 수 있는 요소들(Factor)을 추출하여 진보된 지문인식 시스템을 구현하는 것을 궁극적인 목표로 하고 있다. 따라서, 지금까지의 관련 연구를 바탕으로 지문 인식 시스템을 구현하는 것을 궁극적인 목표로 하고 있다. 따라서. 지금까지의 관련 연구를 바탕으로 지문 인식 시스템의 성능 향상을 위해서 핵심적인 minutiae reference point, 방향 정보의 추출 방법을 제안하고 인식의 종결부라고 할 수 있는 정합(matching)에 관에서 논한 다음, 마지막으로 결론 및 향후 과제로서 개선할 부분을 제시한다.

  • PDF

Future Cyber Information Warfare (사이버 정보전 준비 해야)

  • 오제상
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.31-35
    • /
    • 2001
  • Currently if we are to make a thought to depend on our fast developing information technology, a future war is necessarily to be made a situation of a cyber information warfare. A attacker in the cyber information warfare is able to make attack a military or a civil information and communication system, especially if a attack of a hacker, a virus or a electromagnetic pulse bomb at a military C4ISR system is able to make a confusion or a interruption in military operations, they are available to attack as a real time with non restrictions of physical distance, time, weather and space. While a expenditure of carrying out the cyber information warfares is the lowest expenditure, a effect of carrying out the cyber information warfares is the greatest effect in side of a interruption of information, a confusion, a terror, a pillage and crime of the people. This paper is to introduce "weapons of cyber information warfares", "offence capability of cyber information warfares about several nations" and to propose "a cyber information warfare organization" or the future knowledge warfare. the future knowledge warfare.

  • PDF

A construction Plan for the integrated information network of sports industry (스포츠산업 통합정보망 구축 방안)

  • Jun, Sunhye;Kang, SeungAe;Kim, Hyuncheol;Kwon, Hyungil;Kang, Sunyoung;Kim, Yeojin;Jeon, Heejun
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.63-69
    • /
    • 2013
  • This research analyze the current status pertaining to the sport industry's information system and information network in Korea to propose integrated information network of sport industry construction measures with the goal of optimizing vertical and horizontal network formation, and knowledge information sharing and dissemination. To construct integrated information network of sport industry, literature examination and meeting of experts to search for measures are utilized. This paper analyze the realities of the sport industry's information system and information network in Korea to propose the following when it comes to the measures to realize sport industry's information integration. First, DB for sport industry relate information that factored in the Ontology is being developed. In other words, it is necessary to design a DB that factors in the Semantic Web. Second, once the DB relate to the sport industry that factored in the Ontology is developed, it is necessary to build RSS/Atom based active network that enables exchange of organic information among them.

A Study on Simulation-Based Collaborative E-Learning System for Security Education in Medical Convergence Industry (의료융합산업 보안교육을 위한 시뮬레이션 기반 협동형 이러닝 시스템 연구)

  • Kim, Yanghoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.11
    • /
    • pp.339-344
    • /
    • 2020
  • During COVID-19, education industry is organizing the concept of 'Edutech', which has evolved one step further from the existing e-Learning, by introducing various intelligent information technologues based on the core technology of the 4th industrial revolution and spreading it through diverse contents. Meanwhile, each industries are creating new industries by applying new technology to existing businesses and ask for needs of cultivating human resources who understand the existing traditional ICT technology and industrial business which can solve a newly rising problems. However, it is difficult to build contents for cultivating such human resources with the existing e-learning of transferring knowledge by one-way or some two-way commnication system which has established some interactive conversational system. Accordingly, this study conducted a research on a cooperative e-learning system that enables educators to communicate with learners in real time and allows problem-solving education based on the existing two-way communication system. As a result, frame for contents and prototype was developedp and artially applied to the actual class and conducted an efficiency analysis, which resulted in the validation of being applied to the actual class as a simulation-based cooperative content.