• Title/Summary/Keyword: Corporate Network

Search Result 332, Processing Time 0.039 seconds

A Study on Technology Entrepreneurship Policy Focused on Innovative Growth (혁신성장기반 공공 연구자 중심의 기술창업 활성화 정책연구)

  • Yun, Jeong-Keun;Kwon, Jae-Chul;Choi, Sun-Hee
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.2
    • /
    • pp.51-64
    • /
    • 2019
  • Purpose - Research on the ability of domestic public institutions to conduct business is being conducted. Research on government support policy for public technology projects, emphasizes technology creation. Public agencies are encouraging evolutionary barriers at the stage of realistic business. This paper presents the policy possibilities by presenting policies and strategies based on corporate public policy. Research design, data, and methodology - In this study, we surveyed the actual state of public technology commercialization based on the data on state of technology commercialization of public institutions. We collected and analyzed the literature data to enhance the competitiveness of technology commercialization by identifying success cases of public technology commercialization. In Korea, there are not many research papers that provide policy alternatives for technical commercialization of public research institutes. Therefore, in this paper, we review various government policies and check the status of technology commercialization to increase its value. Results - As a result of this study, it is suggested that various policy development is necessary for the commercialization of public technology, because it is important to increase the value of technology users, suppliers, investors and customers through various network activation. In particular, it is necessary to establish differentiated Korean public technology commercialization model for the proliferation of public technology commercialization by presenting methodical model of technical commercialization. Conclusions - Through this study, it is important to raise the competitiveness of domestic public technology commercialization, to create economic value, and to improve the performance of technology commercialization. Therefore, it is necessary to contribute to the creation of research achievement, research method of excellent technology, and method of commercializing technology, and to create achievement of technical commercialization in the future. In addition, from the viewpoint of commercialization of technology, strategies for creating value through utilization of public technology should be prepared, and a plan for mutual prosperity among domestic companies should be prepared. Policy alternatives of various public technology commercialization to build national competitiveness have been developed, and various examples of performance for the performance of public technology commercialization should be derived.

A Study on the Decision Strategy of Investment Priority Focused on Economics in Distribution Network (경제성에 기반한 배전계통 설비투자 우선순위 결정에 관한 연구)

  • Park, Chang-Ho
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.23 no.9
    • /
    • pp.31-39
    • /
    • 2009
  • This paper shows prioritization process for equipment investment plans considering reliability indices and economical efficiency. To decide prioritization of distribution investment projects, we made a distribution system model using system configuration, it's component and load information and designed several investment alternatives to improve reliability of present system. Lastly, we proposed a evaluation model of economical efficiency assessment on distribution investment alternative projects. To analyze influence by reliability and economical efficiency, we produced economical effects with applying time-varying failure rate of KEPCO's main equipments of distribution system and interruption cost of electric power affected by investment. Finally, in order to insure the validity of this proposed methodology, we compared investment prioritization by economical evaluation with that of real investment alternatives of KEPCO's branch office. In conclusion, this paper shows what and how to interpret the reliability effects of distribution system investments into financial indicators beneficial for power utilities's managers to make decision on the perspective of corporate value.

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

Stage-wise Combination of Key Factors Affecting Healthcare User Innovation by Using Fuzzy-set Qualitative Comparative Analysis (퍼지집합 질적 비교분석을 통한 의료분야 사용자 혁신 단계별 핵심요인 조합 연구)

  • Lee, Sang-Won;Shin, Juneseuk
    • Journal of Technology Innovation
    • /
    • v.24 no.4
    • /
    • pp.193-219
    • /
    • 2016
  • We examine how combinations of key factors affecting healthcare user innovation vary by innovation stages from idea generation through R&D to commercialization and venturing using a fuzzy-set Qualitative Comparative Analysis (fsQCA) of thirty Korean cases in the healthcare field. Our empirical analysis shows that well-functioning innovation network and easy resource acquisition facilitate ideation of radical user innovation. However, technological capability and governmental support are crucial to make a shift to R&D as well as commercialization stages. Differently, incremental user innovation depends heavily on technological capability of users. Our analysis can provide policy makers as well as corporate innovation mangers with a strategic framework for boosting user innovation along three stages.

The Smart Contract based Copyright Protection Model for Wisdom Contents Distribution (지혜콘텐츠 유통에 적합한 스마트계약 기반 저작권 보호 모델)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.21-26
    • /
    • 2019
  • Wisdom contents is made by an ordinary person and contains life tips helpful in general. As the existing copyright management systems are designed for the corporate or professional authors, it's not easy to use and requires high cost for the ordinary person to get the copyright. Blockchain based system can notarize the block of transactions without help of trustful third party such as existing copyright protection center. Thus, blockchain based copyright protection model is needed to protect the ordinary author's copyright. In this study, we propose the smart contract based copyright protection model which run on the blockchain network. The proposed model consists of smart contract creation, contents purchase and profit sharing stages. The digital signature scheme is used to get the contract agreed by the seller and the author. The smart contract stores the author information, contents information and the percentage of the share as states. If the contents is sold, the sales tokens are redistributed to the author and the seller according to the share. The proposed model can be applied to the ordinary person's copyright registration and management for Wisdom contents distributed in cafe, blog, YouTube, etc.

An Analysis of the Relationship between Domestic and Overseas Investment Using a Regression Tree (회귀나무를 이용한 국내외 투자간 관계 분석)

  • Chang, Young-Jae
    • The Korean Journal of Applied Statistics
    • /
    • v.24 no.3
    • /
    • pp.455-464
    • /
    • 2011
  • Overseas direct investment is constantly on the rise, while domestic investment has been slowing and has led to concerns that the expansion of overseas investment may be weakening domestic investment. Considering the change of environment as economic growth, this paper analyzes the relationship between domestic and overseas investment using a regression tree. The result shows that overseas investment substituted domestic investment in the past (before 1985); however, they compensated for each other during the rapid growth period based on exports (1986-1997). The relationship turns out to be insignificant after the Asian currency crisis(after 1998). In addition, this paper also examines the factors determining domestic facilities investment and overseas direct investment at each stage of the changes in their influence due to globalization. Taking into account the results, we need to re-evaluate the current pattern of corporate investment apart from the past restricted point of view to help domestic enterprises efficiently utilize the international production network and resources.

Ransomware attack analysis and countermeasures of defensive aspects (랜섬웨어 공격분석 및 방어적 측면의 대응방안)

  • Hong, Sunghyuck;Yu, Jin-a
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.139-145
    • /
    • 2018
  • Ransomeware is a kind of malware. Computers infected with Ransomware have limited system access. It is a malicious program that must provide a money to the malicious code maker in order to release it. On May 12, 2017, with the largest Ransomware attack ever, concerns about the Internet security environment are growing. The types of Ransomware and countermeasures to prevent cyber terrorism are discussed. Ransomware, which has a strong infectious nature and has been constantly attacked in recent years, is typically in the form of Locky, Petya, Cerber, Samam, and Jigsaw. As of now, Ransomware defense is not 100% free. However, it can counter to Ransomware through automatic updates, installation of vaccines, and periodic backups. There is a need to find a multi-layered approach to minimize the risk of reaching the network and the system. Learn how to prevent Ransomware from corporate and individual users.

The Differences in Motivation and Usage according to Morphological evolution of SNS - Focusing on university students' use of Facebook and Instagram - (SNS의 형태적 진화에 따른 이용동기 및 사용행태 차이 - 대학생의 페이스북과 인스타그램 이용을 중심으로 -)

  • Shin, Hyun-Hee;Kim, Kyung-Ran
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.155-164
    • /
    • 2017
  • The purpose of this study is to analyze the similarities and differences between motivation and usage according to morphological differences between Facebook and Instagram. The formative differentiation of third-generation SNS such as intuitive image and limited network poses the necessity of recognizing individual service users as distinct groups in SNS research. Therefore, this study was conducted to analyze the differences of motivation and usage, according to the motivation of using Facebook and Instagram by 255 university students. As a result, 7 factors were found as motivation for SNS use, and there were therein motivational differences between Facebook and Instagram users. This study is expected to contribute to the prediction of user's attitude change according to the morphological evolution of SNS in the future, and to expand the application to such related fusion research as GUI design and corporate PR marketing.

A Case Study on Job Analysis Utilizing Cluster Analysis and Community Analysis (군집분석 및 커뮤니티 분석 기법을 활용한 직무분석 사례 연구)

  • Jo, Il-Hyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.1
    • /
    • pp.151-165
    • /
    • 2004
  • The purpose of the study was to explore the potential of the Cluster Analysis and the Community Analysis of Social Network Analyses family in job-task analysis for curriculum design. These two multivariate analysis techniques were expected to bring us relevant and scientific information as well as inspiration in investigating the structure and nature of job system, which are critical in developing relevant curriculum. To pursue the purpose mentioned above, qualitative and quantitative data were collected from "S" Corporate, a major large high-tech manufacturing company, and analyzed by relevant analytic procedures. Results indicate that there are discrepancies between formal job structures and actual ones. Following Community analysis showed that the presence of center-marginal structure along with clustering structure in the current job formation. Interpretations of the results of the study are provided in light of past research and additional data collected from the study. Implications of the study are also discussed along with suggestions for future research.

  • PDF

An Efficient Authentication Protocol Using Single Bit Synchronization for Wireless LAN Environment (단일 Bit 동기화를 이용한 무선 LAN 환경에서의 효율적인 인증 프로토콜)

  • Jo Hea Suk;Youn Hee Yong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.747-754
    • /
    • 2004
  • Today, wireless LANs are widely deployed in various places such as corporate office conference rooms, industrial warehouses, Internet-ready classrooms, etc. However, new concerns have been raised regarding suity. Currently, both virtual private network(VPN) and WEP are used together as a strong authentication mechanism. While security is increased by using VPN and WEP together, unnecessary redundancy occurs causing power consumption increase and authentication speed decrease in the authentication process. In this paper a new synchronization protocol for authentication is proposed which allows simple authentication, minimal power consumption at the mobile station, and high utilization of authentication stream. This is achieved by using one bit per a frame authentication, while main authentication process including synchronization is handled by access points. Computer simulation reveals that the proposed scheme significantly improves the authentication efficiency in terms of the number of authenticated frames and authentication speed compared with an earlier protocol employing a similar authentication approach.