• Title/Summary/Keyword: Defender

Search Result 63, Processing Time 0.032 seconds

The Effect of IST Structure and Competitive Strategy on Competitive Advantage : An Empirical Investigation (실증적분석을 통한 전략정보 시스템 구축 방안에 관한 연구 -경쟁적인 우위를 얻기 위한 정보기술 구조와 경쟁 전략-)

  • Kim, Seung-Nam;Jeong, Rak-Chae
    • Asia pacific journal of information systems
    • /
    • v.5 no.2
    • /
    • pp.177-197
    • /
    • 1995
  • In a study involving 52 large organizations in the savings institutions industry, the relationship between information systems technology (IST) structure and competitive strategy was investigated based on structural contingency theory. Structural contingency theory argues that organizational performance is contingent on the congruence between structure and contingent factors. Competitive strategy is considered to be the most important contingent factor among organizational context variables. Two dimensions of IST structure and three types of competitive strategy were employed to test a contingency model. It was found that enhanced congruence between IST structure and competitive strategy was associated with higher competitive advantage. The structural dimension significantly associated with the "defender" strategic stance was more centralized and more integrated application of IST, while the structural dimension significantly associated with "prospector" positioning was more decentralized and less integrated application of IST.

  • PDF

Evaluation on Perception, Elements and Quality of Business Strategy in Domestic Hospitals (국내 병원의 전략에 관한 인식과 구성요소 및 질 수준 평가)

  • Kim, Young-Hoon;Kim, Hyo-Jeong;Kim, Han-Sung;Woo, Jung-Sik
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.37 no.4
    • /
    • pp.181-196
    • /
    • 2012
  • The purpose of this study is to evaluate of the perception, elements and quality level of business strategy in domestic hospitals. We analyze survey data about strategy. Significantly, we find that domestic hospitals were greatly feeling about the necessity and importance of strategy, but elements and quality level of actual execution strategy is much lower. When evaluating level on the perception, elements and quality of strategy within each of Miles and Snow's strategy type, PA(prospector+analyzer) was higher than DR(defender+reactor). And result of structural equation modeling(SEM), elements had a significant influence on the quality of the strategy, a positive relationship between the components and the PA have been identified. Therefore, we propose that to increase the elements level in order to improve the quality level of strategy, and hospital administrators are need to be PA rather than DR.

A Study on a Smart Silver-care Defender (인지능력 저하 노약자를 위한 스마트 성인용 기저귀에 관한 연구)

  • Kim, Sang-Hwan;Sim, Kyung-Min;Lee, Dong-Hyuk;Han, Jea Hyun;Choi, Jae-Sung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.882-883
    • /
    • 2016
  • 본 논문에서는 사물인터넷 제품들 중 환경센서를 이용한 서비스로, 사용자가 케어가 필요한 거동 불편자 및 인지능력 저하 노약자의 기저귀상태를 매번 체크하지 않아도 스마트폰 알림을 통해 용변 유무 상태를 확인 할 수 있는 서비스이다. 본 방법은 아두이노에 부착된 환경센서를 통해 기저귀의 습도, 온도 데이터를 실시간으로 서버에 받아온다. 서버에서는 이 값들을 알고리즘을 통해 일정한 범위를 두어 각각의 상태를 알 수 있도록 만든다. 이렇게 서버에서 가공된 값은 안드로이드로 전송해준다. 안드로이드에서는 가공된 값을 통해 상황별 이미지(activity)을 통해 보여준다. 또한 알림기능을 사용해 실시간 체크를 가능하게 하므로 써 사용자에게 편리한 서비스를 제공한다.

Sphingolipids and Antimicrobial Peptides: Function and Roles in Atopic Dermatitis

  • Park, Kyungho;Lee, Sinhee;Lee, Yong-Moon
    • Biomolecules & Therapeutics
    • /
    • v.21 no.4
    • /
    • pp.251-257
    • /
    • 2013
  • Inflammatory skin diseases such as atopic dermatitis (AD) and rosacea were complicated by barrier abrogation and deficiency in innate immunity. The first defender of epidermal innate immune response is the antimicrobial peptides (AMPs) that exhibit a broad-spectrum antimicrobial activity against multiple pathogens, including Gram-positive and Gram-negative bacteria, viruses, and fungi. The deficiency of these AMPs in the skin of AD fails to protect our body against virulent pathogen infections. In contrast to AD where there is a suppression of AMPs, rosacea is characterized by overexpression of cathelicidin antimicrobial peptide (CAMP), the products of which result in chronic epidermal inflammation. In this regard, AMP generation that is controlled by a key ceramide metabolite S1P-dependent mechanism could be considered as alternate therapeutic approaches to treat these skin disorders, i.e., Increased S1P levels strongly stimulated the CAMP expression which elevated the antimicrobial activity against multiple pathogens resulting the improved AD patient skin.

New RAD(Return Address Defender) : The Solution of Suffer Overflow Attack (New RAD : 버퍼 오버플로우 공격에 대한 해결책)

  • Lee, Min-Jae;Han, Kyung-Sook
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.979-981
    • /
    • 2005
  • "버퍼에 대한 바운드 체크를 하지 않는다"라는 작은 취약성 하나가 버퍼 오버플로우라는 큰 위협을 만들어냈다. 그러나 그것을 단지 C언어의 무결성 문제로 단정 지어 버릴 수도 없는 문제이다. 일반적으로 버퍼 오버플로우 공격은 메모리에 할당된 버퍼의 경계를 넘는 데이터를 입력하여 프로그램의 함수복귀주소를 조작하고 공격자가 원하는 코드를 삽입하여 이루어진다. 이러한 버퍼 오버플로우에 대한 여러가지 대응책들이 나왔지만 약간의 문제점들을 가지고 있다. 그래서 본 논문에서는 운영체제의 세그멘테이션 기법을 이용하여 그 공격에 대응할 수 있는 한 가지 방법을 제시하고자 한다. 기존의 스택가드(카나리아 버전)의 문제점인 우회공격과 카나리아 워드를 추측하여 이루어지는 공격 그리고 MineZone RAD의 문제가 되는 DRAMA 등에 있어서도 효과적으로 방어할 수 있을 것으로 기대한다. 또한 스택가드(Memguard 버전)에서 이곳저곳에 산재되어 관리하기 어려운 함수복귀주소를 별도의 세그먼트 테이블로 쉽게 관리할 수 있을 것이다.

  • PDF

Dynamic Programming Model for Optimal Replacement Policy with Multiple Challengers (다수의 도전장비 존재시 설비의 경제적 수명과 최적 대체결정을 위한 동적 계획모형)

  • Kim, Tae-Hyun;Kim, Sheung-Kown
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.25 no.4
    • /
    • pp.466-475
    • /
    • 1999
  • A backward Dynamic Programming(DP) model for the optimal facility replacement decision problem during a finite planning horizon is presented. Multiple alternative challengers to a current defender are considered. All facilities are assumed to have finite service lives. The objective of the DP model is to maximize the profit over a finite planning horizon. As for the cost elements, purchasing cost, maintenance costs and repair costs as well as salvage value are considered. The time to failure is assumed to follow a weibull distribution and the maximum likelihood estimation of Weibull parameters is used to evaluate the expected cost of repair. To evaluate the revenue, the rate of operation during a specified period is employed. The cash flow component of each challenger can vary independently according to the time of occurrence and the item can be extended easily. The effects of inflation and the time value of money are considered. The algorithm is illustrated with a numerical example. A MATLAB implementation of the model is used to identify the optimal sequence and timing of the replacement.

  • PDF

Design of the Protection System for NoSQL Injection Attack (NoSQL Injection 공격 방어 시스템 설계)

  • Jung, Yong-Hwan;Jo, Jin-O;Gil, Joon-Min;Choi, Jang-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.867-869
    • /
    • 2015
  • 최근 폭발적으로 증가하는 데이터양과 데이터 특성들로 인해 관계형 데이터베이스는 빅데이터 처리에 어려움이 발생하기 시작했으며, 이러한 빅데이터의 신속한 처리를 위해 비정형 데이터 분산처리, 병렬 처리 등 특정한 영역에서 우수한 성능을 보이는 NoSQL 데이터베이스의 활용이 증가하고 있다. 기존 관계형 데이터베이스에서 악의적인 SQL Injection 공격이 시스템에 치명적인 피해를 주는 것과 마찬가지로, 다른 쿼리 언어를 사용하는 NoSQL 데이터베이스에서도 Injection 공격에 대한 취약점이 여전히 존재할 뿐만 아니라, NoSQL 데이터베이스가 비교적 최신 기술이기 때문에 개발자들은 Injection 공격에 대한 인식이 부족한 실정이다. 본 논문에서는 NoSQL 데이터베이스에 대한 대표적인 2가지 Injection 공격 방법을 소개하고, "NoSQL Injection Defender(NID)"라 명명한 Injection 공격 방어 시스템의 설계 방안을 제시하고자 한다.

Finding the Information Source by Voronoi Inference in Networks (네트워크에서 퍼진 정보의 근원에 대한 Voronoi 추정방법)

  • Choi, Jaeyoung
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.6
    • /
    • pp.684-694
    • /
    • 2019
  • Information spread in networks is universal in many real-world phenomena such as propagation of infectious diseases, diffusion of a new technology, computer virus/spam infection in the internet, and tweeting and retweeting of popular topics. The problem of finding the information source is to pick out the true source if information spread. It is of practical importance because harmful diffusion can be mitigated or even blocked e.g., by vaccinating human or installing security updates. This problem has been much studied, where it has been shown that the detection probability cannot be beyond 31% even for regular trees if the number of infected nodes is sufficiently large. In this paper, we study the impact of an anti-information spreading on the original information source detection. We consider an active defender in the network who spreads the anti-information against to the original information simultaneously and propose an inverse Voronoi partition based inference approach, called Voronoi Inference to find the source. We perform various simulations for the proposed method and obtain the detection probability that outperforms to the existing prior work.

IL-17 and IL-21: Their Immunobiology and Therapeutic Potentials

  • Choong-Hyun Koh;Byung-Seok Kim;Chang-Yuil Kang;Yeonseok Chung;Hyungseok Seo
    • IMMUNE NETWORK
    • /
    • v.24 no.1
    • /
    • pp.2.1-2.24
    • /
    • 2024
  • Studies over the last 2 decades have identified IL-17 and IL-21 as key cytokines in the modulation of a wide range of immune responses. IL-17 serves as a critical defender against bacterial and fungal pathogens, while maintaining symbiotic relationships with commensal microbiota. However, alterations in its levels can lead to chronic inflammation and autoimmunity. IL-21, on the other hand, bridges the adaptive and innate immune responses, and its imbalance is implicated in autoimmune diseases and cancer, highlighting its important role in both health and disease. Delving into the intricacies of these cytokines not only opens new avenues for understanding the immune system, but also promises innovative advances in the development of therapeutic strategies for numerous diseases. In this review, we will discuss an updated view of the immunobiology and therapeutic potential of IL-17 and IL-21.

The Effect of Business Strategy on Audit Delay (기업의 경영전략이 회계감사 지연에 미치는 영향)

  • Kim, Jeong-Hoon;Kim, Min-Hee;Do, Kee-Chul;Lee, Yu-Sun
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.219-228
    • /
    • 2022
  • In order to improve audit quality, it is essential to understand the occurrence of disagreement between auditors and managers, and this study aims to analyze the impact of Business Strategies on audit risk and accounting audit delay. To this end, we conducted an empirical analysis using sample 2,910 firm-year data from 2018 to 2020 of KOSPI-listed and KOSDAQ-listed companies. The results of the empirical analysis of this study are as follows. First, compared to the companies of defender type, prospectors can expand audit procedures for new products, R&D costs, and intangible assets, and increase audit delays due to disagreement between managers and auditors. Second, compared to KOSPI-listed companies, the prospectors in KOSDAQ are more likely to have lower financial reporting quality, which further increases audit delays. The results of this study analyzed whether a company's Business Strategy affects the possibility of disagreement between an auditor and a company, and verified whether there is a difference in the audit report lag by stock market. The results of this study show that auditors' strong duty of care is needed for the companies of prospector type with high audit risk, and it is meaningful to present reinforced audit systems and specific guidelines for the companies of prospector type through the definition of prospector type. It also enables the expansion of research to identify the relationship between non-financial factors and audit risks that make up the companies of prospector type.