• Title/Summary/Keyword: Establishing Countermeasure

Search Result 40, Processing Time 0.024 seconds

Marketing strategy and the current status of Global SPA Brands

  • Kim, Mi-Kyung
    • Journal of Fashion Business
    • /
    • v.14 no.3
    • /
    • pp.35-51
    • /
    • 2010
  • This study aims at providing data for establishing a marketing strategy which can enhance the competitiveness of Korea domestic SPA(Specialty Store Retailer of Private Label Apparel) Brands by suggesting countermeasure strategy through the observation and analysis for SPA Brands, under the current circumstance in which the systematic and scholastic discussion for the matter, is lack, despite the diastrophism in fashion industry is prospected according to the rapid growth of Global SPA Brands. For this purpose, the characteristic and current status of Global SPA Brands is examined, and the main cause of growth is analyzed by approaching to their marketing characteristic, in this study. In relation with this situation, this study suggests the provisions as below, which are drawn from the analysis on Global SPA Brands' marketing strategy, so that Korea domestic SPA Brands could achieve successive performance under fierce competition. First, to be a competitive SPA Brands a business should be able to supply products with frequent product turnover by an interval level of one week or so, the existent product planning by seasons, as a business obtains various swift informations on consumers' demand with R&D center foundation. Secondly, SPA Brands should establish a strategy that a business can create high net profit by inventory management which enables lowering inventory ratio remarkably, and a strategy for innovative product supply by small quantity batch production, along with founding a high technological logistics system. Third, SPA Brands should establish a strategy for primary cost reduction by overseas dispersed outsourcing in order to enable diverse product development and rational price setting. Fourth, fashion marketers should establish also a strategy for communication by which brand image can be delivered effectively, by firming the brand identity and by informing product characteristic and customer service totally, with the method of VMD and flagship store. Additionary, fashion marketers also should establish a strategy by developing mobile application which can provide brand image and diverse other fashion related information.

A Study on the Evaluation Process Development for the Use of Outflowing Groundwater in Large-Scale Buildings (대형건축물의 유출지하수 활용을 위한 평가 프로세스구축에 관한 연구)

  • Kim, Jae-Yeob;Lee, Dong-Jin
    • Journal of the Korea Institute of Building Construction
    • /
    • v.10 no.3
    • /
    • pp.91-97
    • /
    • 2010
  • Recently, as a countermeasure to the buoyancy of a building, the use of permanent drainage methods have been on the increase, and these provide benefits both in terms of economical feasibility and efficiency. When a permanent drainage method is applied, some underground water can drain out. Korea has been designated by PAI (Population Action International) as a water-stressed country, and the use of outflowing groundwater is required for the efficient oversight of water resources. However, the evaluation process on the practical use of underground water is currently insufficient. Therefore, the amount of outflowing groundwater put to practical use and the standard for the water quality were examined in this research, with the aim of establishing anappraisal process on the practical use of underground water drainage. In addition, standards for the assessment of the treatment process and the application cost of underground water drainage were developed. On this basis, an evaluation process on the use of outflowing groundwater was developed and applied inthe field. The application result proved that it was possible to assess the initial investment cost and the maintenance and management cost in the field, and thesecan be compared to the costs when supplied water is used, which makes it possible to apply in the field.

Development of Welding Flux and Process for Prevention of Cold Cracking in SAW Weld Metal (잠호용접부 균열방지를 위한 용접 플락스 및 시공기법 개발)

  • Choi, Kee-Young;Kim, Chan;Kim, Young-Pil
    • Special Issue of the Society of Naval Architects of Korea
    • /
    • 2007.09a
    • /
    • pp.118-127
    • /
    • 2007
  • SAW(Submerged Arc Welding) process is generally applied to a wide range of welding area in the fabrication of steel structure. This process has a good characteristic properties such as the high quality of welds and the high deposition rates, but in case of welding on a thick steel plate, it also has higher cold crack susceptibility than that of a thin steel plate. The purpose of this research is to find the main factor of crack generation and clarify the countermeasure for crack prevention, and then establish the optimum welding condition in a heavy thick steel plate. The results of this study are as follows, 1. The cause of crack generation is found the diffusible hydrogen penetrated into weld metal by decomposition of the remained moisture in SAW flux during welding. 2. For the removal of diffusible hydrogen, the raw materials of SAW flux are to be dehydrated at the high temperature in the initial manufacturing stage. 3. Mechanical properties of weld metal welded with the dehydrated SAW flux were evaluated very excellent, furthermore the weld metal has been proved to have low diffusible hydrogen content with 3.1ml /100g. 4. The weldability and quality welded with thick steel plates were improved by establishing the new optimum welding condition.

  • PDF

Analysis of Earthquake Countermeasure for Electrical Facility Building on Domestic and Foreign (국내외 건축물에 시설되는 수변전설비 지진 대책에 관한 조사 분석)

  • Kim, Gi-Hyun;Lee, Sang-Ick;Bae, Suk-Myong
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.22 no.12
    • /
    • pp.150-156
    • /
    • 2008
  • Recently life and properties damage at Japan and China by generating earthquake. For establishing measure for earthquake in domestic, earthquake disaster measure law was enacted on March, 2008 from a natural disaster of earthquake and present the detail part and enforce the measures. This paper analyzes domestic site and problems of electrical facility earthquake measures at transformer vault which the power supply the emergence situation at generating earthquake. Also we present the domestic seismic design and construction direction from research and analysis related law and regulation for the seismic design and construction in domestic and foreign for electrical facility. Afterward we will need to study reliability inspection for electrical facility seismic design method and construction at buildings transformer vault.

The design and implementation of user interface based on contents rating service for blocking harmful Internet information (유해 인터넷 정보 차단을 위한 내용 등급 서비스 기반 사용자 인터페이스 설계 및 구현)

  • 이재선;전용희;장정숙
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.957-964
    • /
    • 2003
  • The circulation of unwholesome information such as obscene and violent information is gradually increasing based on the rapid expansion of information communications infrastructure. Those kinds of information are harmful to the adolescents and even cause social problems so that active countermeasure is requited. In order to cope with the spread of unwholesome information, appropriate regulating methods are absolutely in need by establishing or revising information communications-related laws. In this paper, we had analyzed domestic and foreign programs with existing harmful information blocking method, and then designed and implemented a selective blocking program based on Platform for Internet Contents Selection(PICS) by using selective blocking technology based on Internet contents rating system. We also proposed a compromised rating system blocking method that consists of selective filtering function by age and the popular blocking list. The proposed system has advantages in that there would be no increase in network load resulting from blocking list update and inquiry, it is possible to perform active selective filtering considering user's age, and it may introduce self-imposed rating.

Countermeasure of an Application Attack Scenario Using Spring Server Remote Code Execution Vulnerability (CVE-2018-1270) (스프링 서버 원격코드 실행 취약점(CVE-2018-1270)을 이용한 응용 공격 시나리오의 대응 방안)

  • Jung, Byeong-Mun;Jang, Jae-Youl;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.303-308
    • /
    • 2019
  • Spring framework is widely used as a base technology for e-government frameworks and to the extent it is a standard for web service development tools of Korean public institutions. However, recently, a remote code execution vulnerability(CVE-2018-1270) was found in an application using a spring framework. This paper proposes a method of analyzing the vulnerability experiment using a hacking scenario, Proof Of Concept(POC), in which the spring framework is a hazard to the server. We propose the patch to version 4.3.16 and version 5.0.5 or later as an ultimate response. It is also expected that the proposed experiment analysis on vulnerability of hacking scenario will be used as a data for improving performance of security programs and establishing a new authentication system.

Development of Return flow rate Prediction Algorithm with Data Variation based on LSTM (LSTM기반의 자료 변동성을 고려한 하천수 회귀수량 예측 알고리즘 개발연구)

  • Lee, Seung Yeon;Yoo, Hyung Ju;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.2
    • /
    • pp.45-56
    • /
    • 2022
  • The countermeasure for the shortage of water during dry season and drought period has not been considered with return flowrate in detail. In this study, the outflow of STP was predicted through a data-based machine learning model, LSTM. As the first step, outflow, inflow, precipitation and water elevation were utilized as input data, and the distribution of variance was additionally considered to improve the accuracy of the prediction. When considering the variability of the outflow data, the residual between the observed value and the distribution was assumed to be in the form of a complex trigonometric function and presented in the form of the optimal distribution of the outflow along with the theoretical probability distribution. It was apparently found that the degree of error was reduced when compared to the case not considering where the variance distribution. Therefore, it is expected that the outflow prediction model constructed in this study can be used as basic data for establishing an efficient river management system as more accurate prediction is possible.

Flood Damage Index regarding Regional Flood Damage Characteristics (지역별 홍수피해특성을 고려한 홍수피해지표 개발)

  • Park, Taesun;Yeo, Chang Geon;Choi, Minha;Lee, Seung Oh
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.4B
    • /
    • pp.361-366
    • /
    • 2010
  • It would be helpful to evaluate the potential flood damage and compare quantitatively with each other when establishing the regional flood countermeasure and determining the execution of the restoration works and emergency action plans. The Flood Damage Index (FDI) in Korea, possible to estimate localized potential risks caused by flood damages, therefore, was proposed in this study. It was considered with the scale of regional flood damages including the regional characteristics and quantitative grounds. First, the four significant causes were categorized as natural, social, politic, and facilitative ones. And the eleven selected factors representing four causes were determined. Finally, the FDI was obtained by the weighting linear summation of the corrected 11 factors multiplied by the weighting values based on the professional questionnaires. Employing the FDI, the potential risk analysis about flood damages for 229 cities and counties in Korea was conducted. These results would be utilized as the essential basis for more rational and practical countermeasures and plans against flood damage.

Compilation of Books on Military Arts and Science and Ideology of Military Science in the late Joseon Dynasty (조선(朝鮮) 후기(後期)의 병서(兵書) 편찬(編纂)과 병학(兵學) 사상(思想))

  • Yun, Muhak
    • The Journal of Korean Philosophical History
    • /
    • no.36
    • /
    • pp.101-133
    • /
    • 2013
  • In this paper, the writer investigated the thoughts on military art and science with a focus on the typical books on military art and science, which was published in the latter period of Joseon, and the discussion of literati in that time. Joseon had been happy to enjoy the piping times of peace for about 200 years ever since the establishment of the dynasty. However, having had to gone through two major wars, the Joseon Dynasty, revolving around scholarly people, had awakened the limits of military art and science of Joseon. It can be said that the countermeasure against Japanese pirates, which were reflected in the "Jingbirok" (懲毖錄 - Records of the 1592 Japanese Invasion) written by Yu Seong-ryong, and the experiences of war had formed the basis of the thoughts on military art and science in the latter period. Regrettably, there were no suggestions or proposals of preparing countermeasure against Japanese raiders in the books of military art and science in the early period of the Joseon Dynasty. Meanwhile, as the argument about the battle formation in the early period of Joseon, the process of establishing the military science had not gone smoothly in the latter period of Joseon. Right after the Japanese invasion of 1592, "Gihyo-Sinseo" (紀效新書 - New Text of Practical Tactics written by Cheok Gye-gwang) was brought into the country by the army of Ming (明) Dynasty. At first, this was used in the form of its original edition, or of abstract version in the military drill. But, later, it was published under the title of "Byeonghak-jinam" (兵學指南 - Military Training Manual about Action Rules by combat situation). This book, same as in Zhejian (浙江) province in China, had achieved a positive effect on counteracting the Japanese raiders in our country. However, these military tactics were conflicted with "Owi Jinbeop" - Rules of Deployment of the Five Military Commands, which had been handed down ever since the early period of the Joseon Dynasty, and, at the same time, it was pointed out that those tactics would not be able to apply to the situation uniformly, since Korea and China were geographically different. Furthermore, having gone through Manchu Invasion of 1636 (丙子胡亂, Byeongja horan) Joseon had used "Yeonbyeongsilgi" (練兵實記 - the Actual Records of Training Army), which was compiled in China on the basis of the experiences of wars against the nomad, including Mongolia and so on. And, this had become a typical training manual together with "Byeonghak-jinam". King Yeong Jo and King Jeong Jo of the Joseon Dynasty had tried to establish uniformity in military training by publishing the books of military science representing the latter period of Joseon such as "Sokbyeongjangdoseol" (續兵將圖說- Revision of the Illustrated Manual of Military Training and Tactics,) "Byeonghaktong" (兵學通 Book on Military Art and Science,) "Byeonghakjinamyeonui" (兵學指南演義 - Commentary on 'Byeonghak-jinam') and "Muyedobotongji"(武藝圖譜通志 - Comprehensive Illustrated Manual of Martial Arts,) and so on. King Jeong Jo had actively participated in the arguments in those days. So then the arguments that had been continued for about 200 years, ever since King Seon Jo, put to an end. To sum up the distinctive features of military art and science in both former and latter period of the Joseon Dynasty, in the former period of Joseon, the reasoning military science was proceeded with the initiative of civic official based on "Mugyeongchilseo"(武經七書- the Seven Military Classics). However, in the latter period of Joseon, "Gihyo-Sinseo"(紀效新書 - New Text of Practical Tactics written by Cheok Gye-gwang) had served as a momentum, and also comparatively a large numbers of military official had participated in arguments, so then such an occasion had made the military science turn into the Practical Theory. Meanwhile, King Sejo and King Jeong Jo had played a leading role in the process of establishing the theory of military science of Joseon, however, there are something in common that their succession to the throne was not smooth. This is the part that reminds us "War is an extension of politics," the thesis of Clausewitz

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.