• Title/Summary/Keyword: Comprehensive Security

Search Result 447, Processing Time 0.025 seconds

A Study on the Quality of Mobile Web Service for Environment Landscape Architecture - Focus on Korean Professional Portal Site, Lafent - (환경조경 이동통신용 웹의 서비스 품질 연구 - 전문포털사이트 라펜트를 중심으로 -)

  • Choi, Ja-Ho;Oh, Jeong-Hak
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.23 no.2
    • /
    • pp.17-31
    • /
    • 2020
  • In the field of environmental landscape architecture, the internet medium is used as an effective communication tool not only in the private level but also in the policy level. Recently, the active utilization of mobile web service is emphasized as the time changes, but there is not much improvement or advance in services due to lack of relevant studies. Therefore, this study is intended to provide basic data needed for improvement and advance by researching the quality of mobile web service among multichannel services provided in environmental landscape architecture related internet media. The model for measuring service quality is SERVQUAL, which was verified in the study of Choi(2015), Choi and Koo(2016), and the final valid samples are total 230. First, the subjects were analyzed as the representative media that are possible to acquire comprehensive knowledge related to environmental landscape architecture. Second, the highest importance level in each subsection was 'protection and security maintenance of customer information' followed by 'Reliability about accurate information supply'. Regarding performance level, 'Reliability about accurate information supply' and 'professional knowledge to communicate with users' are highly evaluated. Third, regarding Importance-Performance Analysis(IPA), the first priority management should is 'Tangibles', and the next are 'Responsibility' and 'Empathy'. The ones for maintenance of the status quo are 'Reliability' and 'Assurance', and there is none for effort reduction. Meanwhile, regarding the importance of each factor and difference in the quality of PC web service and mobile web service studied before, the biggest difference is in 'Tangibles', followed by 'Assurance', 'Empathy', 'Responsibility' and 'Reliability'. It is suggested that the revitalization of Landscape information science(LB1106) presented in the National Science&Technology Standard Classification System is needed. In the future, it is necessary to research the change trend on users' response through continuous evaluation of improved mobile web service.

Determinants of Intent to Leave among Workers at Long-Term Care Institutions (노인의료복지시설 근무자들의 이직의도 결정요인)

  • Oh, Ji-Young;Seo, Young-Joon;Park, Hyun-Suk
    • The Korean Journal of Health Service Management
    • /
    • v.6 no.1
    • /
    • pp.87-103
    • /
    • 2012
  • The purpose of this study is to investigate the determinants of intent to leave among workers at long-term care institutions in South Korea. The model represents a revision of the Price(2001) model which extends previous research by providing a comprehensive review of the economic, psychological, sociological literature. This study also examined the moderating effects of values toward independent variables on the job satisfaction and organizational commitment. The sample used in this study consisted of 400 workers from 9 long-term care hospitals and facilities nationwide. Data were collected with self-administered questionnaires and analysed using multiple regression analysis and path analysis. The main results of the study were as follows. The variance of job satisfaction and organizational commitment explained by the independent variables used in the study are 74.5% and 76.3% respectively. The results of this study revealed that the following variables have significant negative effects on intent to leave among workers; organizational commitment, job satisfaction, positive affectivity, supervisor support, job significance, job security, job growth. And the following variables have significant positive effects on intent to leave among workers; job opportunity, negative affectivity. This result is same when the moderating role of values were considered in the analysis. Among demographic variables, only age was found to have a significant positive effect on the intent to leave among workers.

Risk identification, assessment and monitoring design of high cutting loess slope in heavy haul railway

  • Zhang, Qian;Gao, Yang;Zhang, Hai-xia;Xu, Fei;Li, Feng
    • Structural Monitoring and Maintenance
    • /
    • v.5 no.1
    • /
    • pp.67-78
    • /
    • 2018
  • The stability of cutting slope influences the safety of railway operation, and how to identify the stability of the slope quickly and determine the rational monitoring plan is a pressing problem at present. In this study, the attribute recognition model of risk assessment for high cutting slope stability in the heavy haul railway is established based on attribute mathematics theory, followed by the consequent monitoring scheme design. Firstly, based on comprehensive analysis on the risk factors of heavy haul railway loess slope, collapsibility, tectonic feature, slope shape, rainfall, vegetation conditions, train speed are selected as the indexes of the risk assessment, and the grading criteria of each index is established. Meanwhile, the weights of the assessment indexes are determined by AHP judgment matrix. Secondly, The attribute measurement functions are given to compute attribute measurement of single index and synthetic attribute, and the attribute recognition model was used to assess the risk of a typical heavy haul railway loess slope, Finally, according to the risk assessment results, the monitoring content and method of this loess slope were determined to avoid geological disasters and ensure the security of the railway infrastructure. This attribute identification- risk assessment- monitoring design mode could provide an effective way for the risk assessment and control of heavy haul railway in the loess plateau.

A Study on Making Map of Flood Using Digital Elevation Model (DEM) (수치표고모형 (DEM)을 이용한 침수재해 지도작성에 관한 연구)

  • Lim, Hyun Taek;Kim, Jae Hwi;Lee, Hak Beom;Park, Sung Yong;Kim, Yong Seong
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.59 no.2
    • /
    • pp.81-90
    • /
    • 2017
  • Recent floodplain data are important for river master plan, storm and flood damage reduction comprehensive plan and pre-disaster impact assessment. Hazard map, base of floodplain data, is being emphasized as important method of non-structural flood prevention and consist of inundation trace map, inundation expected map and hazard information map. Inundation trace map describes distribution of area that damaged from typhoons, heavy rain and tsunamis and includes identified flood level, flood depth and flood time from flooding area. However due to lack of these data by local government, which are foundational and supposed to be well prepared nationwide, having hard time for making inundation trace map or hazard information map. To overcome this problem, time consumption and budget reduction is required through various research. From this study, DEM (Digital Elevation Model) from image material from UAVS (Unmanned Aerial Vehicle System) and numeric geographic map from National Geographic Information Institute are used for calculating flooding damaged area and compared with inundation trace map. As results, inundation trace map DEM based on image material from UAVS had better accuracy than that used DEM based on numeric geographic map. And making hazard map could be easier and more accurate by utilizing image material from UAVS than before.

A Multidimensional Approach on Poverty of Households with Children : A Typology Using Latent Class Analysis (아동거주가구의 빈곤에 관한 다차원적 접근 : 잠재집단분석을 이용한 유형화)

  • Joung, Eunhee;Choi, Youseok
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.6
    • /
    • pp.129-139
    • /
    • 2014
  • The purpose of this study is to examine the features of children poverty in Korea. Using the 7th Korean Welfare Panel Study, this study conducts latent class analysis to classify households with children. Results show that households with children are classified into three types: 1) housing expenditure overburdened households, 2) multidimensional deprivation households, 3) non-poverty households. The housing expenditure overburdened households have higher rates of housing expenditures than the other two groups. The multidimensional deprivation households experience various types of deprivation such as food insecurity, poor housing, and unstable job security for householders. The results imply that comprehensive approaches are needed to address multiple problems which poor households with children suffer.

A Case Study on the Global Technology Cooperation: R&D Collaboration between ETRI and Microsoft ("글로벌 기술협력 성공사례" ETRI와 Microsoft사의 공동연구개발 성공요인분석 - '자기 통제강화형지갑ID시스템개발' 과제를 중심으로 -)

  • Suh, Sang-Hyuk;Lee, Sun-Young
    • Journal of Korea Technology Innovation Society
    • /
    • v.14 no.4
    • /
    • pp.1050-1072
    • /
    • 2011
  • It is well known that international cooperation is considerably more difficult because of the difference of interests, level of technology of the partners, social and culture as well as various macro-environmental conditions. This case study aims to investigate the success factors of international R&D collaboration between two firms. For it, an in-dept interview was conducted to the Etri-Microsoft Information Security Lab. A comprehensive research on theories, such as resource-based theory, network theory, relationship marketing theory and market power perspective was done as well. The results show clear objectives, communications based on trust, core competence on which the counterpart can rely on, consideration on the government decision process as well as the environment are important for success.

  • PDF

Solving the Discrete Logarithm Problem for Ephemeral Keys in Chang and Chang Password Key Exchange Protocol

  • Padmavathy, R.;Bhagvati, Chakravarthy
    • Journal of Information Processing Systems
    • /
    • v.6 no.3
    • /
    • pp.335-346
    • /
    • 2010
  • The present study investigates the difficulty of solving the mathematical problem, namely the DLP (Discrete Logarithm Problem) for ephemeral keys. The DLP is the basis for many public key cryptosystems. The ephemeral keys are used in such systems to ensure security. The DLP defined on a prime field $Z^*_p of random prime is considered in the present study. The most effective method to solve the DLP is the ICM (Index Calculus Method). In the present study, an efficient way of computing the DLP for ephemeral keys by using a new variant of the ICM when the factors of p-1 are known and small is proposed. The ICM has two steps, a pre-computation and an individual logarithm computation. The pre-computation step is to compute the logarithms of a subset of a group and the individual logarithm step is to find the DLP using the precomputed logarithms. Since the ephemeral keys are dynamic and change for every session, once the logarithms of a subset of a group are known, the DLP for the ephemeral key can be obtained using the individual logarithm step. Therefore, an efficient way of solving the individual logarithm step based on the newly proposed precomputation method is presented and the performance is analyzed using a comprehensive set of experiments. The ephemeral keys are also solved by using other methods, which are efficient on random primes, such as the Pohlig-Hellman method, the Van Oorschot method and the traditional individual logarithm step. The results are compared with the newly proposed individual logarithm step of the ICM. Also, the DLP of ephemeral keys used in a popular password key exchange protocol known as Chang and Chang are computed and reported to launch key recovery attack.

Evaluation Criteria of the Walkway Level-of-Service in Korea (국내 보행 서비스수준의 평가기준)

  • 김경환
    • Journal of Korean Society of Transportation
    • /
    • v.17 no.3
    • /
    • pp.31-46
    • /
    • 1999
  • In the middle of motorization, the traffic problems become serious social problems in Korea. The walking environment is not only a topic which restores the community spirit of a city or society but also a lever which renovates the future space of the city environment-friendly. Thus, the Purpose of this study is to suggest the new criteria of walkway level of service adopting the concepts of safety. convenience, comfort, environment, security, and continuity in addition to present pedestrian flow rate, and to provide basic data for walkway plan in Korea. In order to analyze the adequacy of the present walkway level of service criteria, the walkways of which service levels were A, C, E according to USHCM were selected as study walkways, and an interview surrey was conducted to compare the three service levels with those that pedestrians evaluate actually. Also, another interview survey was conducted to analyze the service conditions and satisfaction level at the walkways of high service levels(A and B). For the establishment of more reasonable walkway level of service criteria. the survey of pedestrian\`s consciousness for walkway service was conducted. Based on the survey results, the new criteria for the evaluation of walkway service were selected and the six levels of service for each criterion was analyzed: so the comprehensive criteria of walkway level of service were suggested.

  • PDF

A Realtime Malware Detection Technique Using Multiple Filter (다중 필터를 이용한 실시간 악성코드 탐지 기법)

  • Park, Jae-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.77-85
    • /
    • 2014
  • Recently, several environment damage caused by malicious or suspicious code is increasing. We study comprehensive response system actively for malware detection. Suspicious code is installed on your PC without your consent, users are unaware of the damage. Also, there are need to technology for realtime processing of Big Data. We must develope advanced technology for malware detection. We must analyze the static, dynamic of executable file for fundamentally malware detection in recently and verified by a reputation for verification. It is need to judgment of similarity for realtime response with big data. In this paper, we proposed realtime detection and verification technology using multiple filter. Our malware study suggests a new direction of realtime malware detection.

A Study on the Activation of Dual Use Technology Program (민.군겸용기술사업 활성화 방안 연구)

  • Kim, Chul-Whan;Choi, Eun-Ho;Heo, Whan
    • Journal of the military operations research society of Korea
    • /
    • v.32 no.1
    • /
    • pp.13-35
    • /
    • 2006
  • This study aims to propose alternative suggestions for practical and efficient implementation of Dual Use Technology Programs(CUTP) in Korea which can strengthen both national security and industrial competitiveness. DUTP of Korea has suffered from inefficiency and inactivity. This study analyzes the Inefficiency and negative factors of DUTP of Korea by examining the previous cases of the advanced countries. It also examines individual problems of DUTP carefully and attempts to derive alternative solutions to improve the current situation. First, a global government plan should be made considering Korea's weapon system and Korea's industrial characteristics. Second, DUTP should begin to develop core technology in connection with technology level evaluation and technology exchange project should establish a comprehensive information network system which links any civilian and military technology data. Third, technology transfer project should be promoted by utilizing cyber technology exchange market and military defense venture center. Fourth, standardization project should be expanded by establishing a national standard information system.