• Title/Summary/Keyword: Cyber world

Search Result 372, Processing Time 0.027 seconds

An Exploratory Study on the Development of Evaluation Factors in Franchise System: Symbiosis Index (프랜차이즈 시스템의 평가 지표 개발을 위한 탐색전 연구 - 공생지수(symbiosis index)를 중심으로 -)

  • Choi, Sung-Sik;Kim, Hong-Seok;Ku, Bon-Hyuk;Lee, Weon-Ho;Na, Hwa-Sook;Han, Kyu-Chul
    • The Korean Journal of Franchise Management
    • /
    • v.1 no.1
    • /
    • pp.65-85
    • /
    • 2010
  • The key success factors for Franchise Enterprise as a virtual company which is established based on franchise system are the competitiveness of sub-systems in franchise system such as franchisor, franchisee, vendor(supplier), and customer, and to sustain the symbiotic relationship among sub-systems. In this regard, evaluating franchise system is considered to be implemented in different contexts and methods comparing with extant evaluation system in franchise business which is more focused on the relationship between franchisor and franchisee. The flagship role of establishing franchise system is to be franchisor system, however, the symbiotic relationship among other sub-system including franchisee, vendor, and customer leads to successful Franchise Enterprise. The purpose of this study is to research existing evaluation systems for franchise business and to explore the model of evaluating franchise system, what is called, "Symbiosis Index".

Comparative Analysis of Information Security Textbooks for Chinese Elementary and Secondary Students (중국의 초·중등학생 대상 정보보호 교재 비교 고찰)

  • Eunsun Choi;Namje Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.183-192
    • /
    • 2023
  • Digital transformation is taking place rapidly around the world. As the development of digital technology becomes very fast, more information is expected to be digitized. Therefore, the possibility of cyber threats is increasing in transmitting and storing sensitive information such as personal and financial information online. In this paper, we compared and analyzed information security textbooks for elementary and secondary school students in China, where the recent development of artificial intelligence and digital transformation are rapidly occurring. After we collected related textbooks, textbooks suitable for analysis were selected. Then, we analyzed the external and internal systems of the textbooks separately. As a result of the external system analysis, all the textbook covers were properly produced, but the quality difference was significant among textbooks. In the case of textbooks for elementary school students, the excellence of layout and content placement was noticed. On the other hand, due to the internal system analysis, various contents were not included evenly when looking at the learning contents based on the "information society responsibility" learning goals presented in China. Through this paper, we hope to provide implications for information security-related education and textbook development research.

The Search of Causality between Life Satisfaction and Domain Satisfactions: Analysis through Autoregressive Crosslagged Model (전반적 삶의 만족도와 영역특정적 삶의 만족도 간 인과관계의 탐색)

  • Han, Jeong-Kyun;Lim, Sung-Moon
    • Korean Journal of Health Psychology
    • /
    • v.16 no.3
    • /
    • pp.609-622
    • /
    • 2011
  • The purpose of this study is to investigate the causality between life satisfaction and domain satisfactions. For this study, data were collected from 207 respondents. They completed World Health Organization Quality of Life Assessment Instrument - Brief (WHOQOL-BREF) which is self-report questionnaire asking about life satisfaction and domain satisfactions. For data analysis, the verification procedure by autoregressive crosslagged modeling of structural equation was used. The analysis results of measures showed the causal relation between the two variables, that is, domain satisfactions acted as cause of life satisfaction. There were discussions on the issues about the analysis method of the autoregressive crosslagged modeling, the implications of the results, and the limits of the research. This study ascertained the intervention direction between life satisfaction and domain satisfactions to promote life satisfaction.

Evaluation of Vasodilative Effects on 10 Traditional Herbal Formulas for Treatment of Hypertension (고혈압 치료를 위한 상용하는 한약 처방 10종의 혈관이완 평가)

  • Bumjung Kim
    • The Korea Journal of Herbology
    • /
    • v.39 no.3
    • /
    • pp.69-76
    • /
    • 2024
  • Objectives : Hypertension (high blood pressure), one of the world's major chronic diseases, has a high mortality rate due to its high prevalence and complications, but its control rate is low. The proper management and control through appropriate exercise, diet management, and optimal drug choice can reduce the risk of death from hypertension. Although various antihypertensive drugs are used to treat hypertension, they also have numerous adverse effects. Alongside increased interest in the use of Traditional Herbal Formulas (THF) for hypertension treatment, the purpose of this study was to examine the vasodilative effects of 10 THF in the rat thoracic artery pre-contracted by potassiumchloride (KCl). Methods : THF were extracted with distilled water for 2 hours. The rat thoracic artery was suspended and contracted by KCl in the organ bath which contained 10 ml Krebs Henseleit (KH) buffer. THF extracts were added in a dose-dependent increase (10-1,000 ㎍/mL) to examine vasodilative effects. The vasodilative effects produced by THF were expressed as the percentage in response to KCl-induced contraction. Results : Among the 10 THF, Banhasasim-tang, Buhnsimgieum, Sagunja-tang, and Samul-tang showed vasodilative effects. And, Sipjeondaebo-tang, Ssanghwa-tang, Ojeok-san, Onkyung-tang, Yongdamsagan-tang, and Hyangsayukgunja-tang showed no significant vasodilative effects. Also, in co-administration with amlodipine, Banhasasim-tang showed higher vasodilative effects than amlodipine alone, and Buhnsimgieum showed greater vasodilative effects at low concentrations, but inhibited amlodipine's vasodilative effects at high concentrations. Conclusion : As a result of these studies, they will be expected to provide useful data to establish guidelines of combined administration of THF and western antihypertensive drugs for the treatment of hypertension.

Enhanced ACGAN based on Progressive Step Training and Weight Transfer

  • Jinmo Byeon;Inshil Doh;Dana Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.3
    • /
    • pp.11-20
    • /
    • 2024
  • Among the generative models in Artificial Intelligence (AI), especially Generative Adversarial Network (GAN) has been successful in various applications such as image processing, density estimation, and style transfer. While the GAN models including Conditional GAN (CGAN), CycleGAN, BigGAN, have been extended and improved, researchers face challenges in real-world applications in specific domains such as disaster simulation, healthcare, and urban planning due to data scarcity and unstable learning causing Image distortion. This paper proposes a new progressive learning methodology called Progressive Step Training (PST) based on the Auxiliary Classifier GAN (ACGAN) that discriminates class labels, leveraging the progressive learning approach of the Progressive Growing of GAN (PGGAN). The PST model achieves 70.82% faster stabilization, 51.3% lower standard deviation, stable convergence of loss values in the later high resolution stages, and a 94.6% faster loss reduction compared to conventional methods.

Proposal on for Response System to International Terrorism (국제 테러리즘의 대응체제 구축방안)

  • Suh, Sang-Yul
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.99-131
    • /
    • 2005
  • Terrorism which became today's common phenomena over the world is one of the most serious threats the world confront. Although International society make and operate outstanding anti-terrorism system, terror would never end without solving fundamental problems. The main body of terrorism converts from nation to organization and from organization to cell, which makes it difficult for us to recognize the main body. Since the target of today's new terrorism is many and unspecified persons, terrorists will never hesitate to use mass destruction weapons such as nuclear, biological, chemical weapons, and also use cyber-technique or cyber-terrorism. So, effective counter-terrorism measures should be performed as follows. First, it must be better for international society should make long-time plan of solving fundamental problems of terrorism other than to operate directly on terror organization and its means. Second, preventive method should be made. The most effective method of eradicating terrorism is prevention. For this, it is necessary to remove environmental elements of terrorism and terrorist bases, and to stop inflow of money and mass destruction weapons to terrorists. Third, integrated anti-terror organization should be organized and operated for continuous counter-terrorism operations. Also international alliance for anti-terrorism should be maintained to share informations and measures. Fourth, concerned department in the government should prepare counter-terrorism plans in their own parts as follows and make efforts to integrate the plans. - Ministry of Government Administration and Home Affairs : conventional terror - Ministry of Health and Welfare : bio-terror - Ministry of Science and Technology : nuclear-terror Especially, they should convert their policy and operation from post-terror actions to pre-terror actions, designate terror as national disaster and organize integrated emergency response organization including civil, government, and military elements. In conclusion, pre-terror activities and remedy of fundamental causes is the best way to prevent terror. Also, strengthening of intelligence activities, international cooperations, and preventive and comprehensive counter-measures must not ignored.

  • PDF

A Comprehensive Representation Model for Spatial Relations among Regions and Physical Objects considering Property of Container and Gravity (Container 성질과 중력을 고려한 공간과 객체의 통합적 공간관계 표현 모델)

  • Park, Jong-Hee;Lim, Young-Jae
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.3
    • /
    • pp.194-204
    • /
    • 2010
  • A space, real or virtual, comprises regions as its parts and physical objects residing in them. A coherent and sophisticated representaion scheme for their spatial relations premises the precision and plausibility in its associated agents' inferencing on the spatial relations and the development of events occurring in such a space. The existing spatial models are not suitable for a comprehensive representation of the general spatial relations in that they have limited expressive powers based on the dichotomy between the large and small scales, or support only a small set of topological relations. The representaion model we propose has the following distinctive chracteristics: firstly, our model provides a comprehensive representation scheme to accommodate large and small scale spaces in an integrated fashion; secondly, our model greatly elaborated the spatial relations among the small-scale objects based on their contact relations and the compositional relations among their respective components objects beyond the basic topological relations like disjoint and touch; thirdly, our model further diversifies the types of supported relations by adding the container property besides the soildness together with considering the gravity direction. The resulting integrated spatial knowledge representation scheme considering the gravity allows the diverse spatial relations in the real world to be simulated in a precise manner in relation to the associated spatial events and provides an expression measure for the agents in such a cyber-world to capture the spatial knowledge to be used for recognizing the situations in the spatial aspects.

A study on the characteristics of brain image and yeongsang expression in the digital information environment (디지털 정보환경에 있어 뇌내 이미지와 영상표현의 특성에 관한 연구)

  • 이규옥
    • Archives of design research
    • /
    • v.16 no.2
    • /
    • pp.323-334
    • /
    • 2003
  • This study is focused on subjective images that are produced before visualization in the digital information environment and on characteristics of objective, dynamic image expression that specifies the subjective images. In this study, the visual world that works in the action of "see"is expanded into vision of eyes, vision of brain, and vision of camera. Also we have redefined the definitions of image and its materialized image, yeongsang. It is defined that image contains a strong meaning of consciousness and mind, and that yeongsang involves vision in which constantly changing information of light is created and reproduced by physical processes. We made it clear that image expression in the 21 st century is becoming more generalized, simplified, and concentrated, by the digital technology, from existing specific non-real images to "informationalized" non-real images. This means that there exists an intrinsic difference in the expressional form of the modern analog environment and that of the recent digital environment in the area of yeongsang communication. Along with development of technology, image information raises plastic reality through indirect experience in the virtual space by expanding the sensual faculty of human. However, there also is a tendency for humans to rely more on technology instead of utilizing their creative faculty. Image expression by“the digital information environment” in the 21st century will pursue two sides; one is to shift from external expression of the human body in the cyber space to internal expression, and the other is to internalize the image world and make it connected worldwide. Further research is necessary in these fields.ary in these fields.

  • PDF

Military Security Policy Research Using Big Data and Text Mining (빅데이터와 텍스트마이닝 기법을 활용한 군사보안정책 탐구)

  • Kim, Doo Hwan;Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.23-34
    • /
    • 2019
  • This study utilized big data, one of the new technologies of the Fourth Industrial Revolution as a policy direction study related to the military security of the Army. By utilizing Text mining and analyzing military security trends in domestic and foreign papers, it will be able to set policy directions and reduce trial and error. In this study, we found differences in domestic and international studies on military sucurity. At first, Domestic research has shown that in the course of the fourth industrial revolution, there is a strong interest in technological security, such as IT technology in security and cyber security in North Korea. On the other hand, Foreign research confirmed that policies are being studied in such a way that military sucurity is needed at the level of cooperation between countries and that it can contribute to world peace. Various academic policy studies have been underway in terms of determining world peace and security levels, not just security levels. It contrasted in our immediate confrontation with North Korea for decades but suggest complementary measures that cannot be overlooked from a grand perspective. Conclusionally, the direction of academic research in domestic and foreign should be done in macro perspective under national network cooperation, not just technology sucurity research, recognizing that military security is a policy product that should be studied in a security system between countries.

A Design on Information Security Core Knowledge for Security Experts by Occupational Classification Framework (보안전문인력 양성을 위한 직업분류체계별 정보보호 핵심지식 설계)

  • Lee, Hyojik;Na, Onechul;Sung, Soyoung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.113-125
    • /
    • 2015
  • Information Security Incidents that have recently happen rapidly spread and the scale of that incidents' damage is large. In addition, as it proceeds to the era of converged industry in the future environment and the virtual cyber world expands to the physical world, new types of security threats have occurred. Now, it is time to supply security professionals who have a multi-dimensional security capabilities that can manage the strategies of technological security and physical security from the management point of view, rather than the ones who primarily focus on the traditional technologic-centered strategies to solve new types of security threats. In conclusion, in this paper we try to produce the curriculum of information security featured in the occupational classification system and analyze the subjects that are additionally required for those who move to other occupations to cultivate security professionals who suited to the converged-industrial environment. It is expected that multi-dimensional security professionals who suited to the converged-industrial environment will be cultivated by harmoniously integrating information security subjects from technological and business/managerial perspectives, and education training courses will be developed that effectively provide core knowledges per occupational classification when people moves to other occupations in the areas of information security.