• Title/Summary/Keyword: Insider

Search Result 184, Processing Time 0.027 seconds

Yoon Gil-Young's "A Study on the Methodology of Traditional Korean Medical Physiology" : Review from an Insider's Viewpoint (현곡(玄谷) 윤길영(尹吉榮)의 "한방생리학(漢方生理學)의 방법론(方法論) 연구(硏究)" 재 조명)

  • Lee, Choong-Yeol
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.23 no.4
    • /
    • pp.751-760
    • /
    • 2009
  • Yoon Gil-Young(1911-1987) was a frontier of the field of Traditional Korean Medical Physiology(TKMP) who was academically active since mid 1950s until early 1970s. He wrote several important papers and books. Among his writings, "A Study on the Methodology of Traditional Korean Medical Physiology", which was published serially in the "Korean Oriental Medical Journal" from June 1966 until March 1967, played an important role in establishing the contemporary TKMP and showed his academic stance on Traditional Korean Medicine(TKM). This review will evaluate this paper's contribution to the establishment of TKMP in historical context, summarize the unique characteristics of his understanding of TKMP by analyzing the text, and then based on those information, examine his view on TKMP and TKM. Historically, this paper was written in transition period from the traditional TKM knowledge system to the modernized one. Aim of this paper was to provide a methodology for establishing TKMP as a scientific knowledge system like that of the western medicine. Based on his study of Yin-Yang theory and theory of five circuits and six qi in Huangdi's Internal Classics, he suggested those theories as methods to observing life phenomena and systematizing the observations. And he regarded these methods as of great value in determining the unique characteristics of TKM compared to those of western medicine. Through re-reading this paper, it was found that he had pride and confidence in the methodology of TKM, and also that he thought in scientizing and modernizing TKM it was very important to understand and efficiently put in use the methodology of TKM. It was also found that his view on TKMP and TKM was pro modernization.

The Effects of Boards' and Directors' Characteristics on R&D Investment: In the Korean Context (이사회 및 이사의 특성이 기업의 연구개발투자에 미치는 영향: 한국기업을 중심으로)

  • Lim, Mi-Hee
    • Journal of Technology Innovation
    • /
    • v.25 no.2
    • /
    • pp.1-34
    • /
    • 2017
  • This paper seeks to explore the effects of the board structure and director characteristics on the R&D investment of a company. The results from analyzing 95 Korean listed companies reveal that the directors' demographic characteristics substantially affect the R&D intensity. When the directors are younger, major in science or engineering, and have an experience of studying abroad, they tend to be supportive of R&D, thereby increasing the R&D expenditure. Particularly, the effects of insider directors are shown to be greater than those of outside directors, which implies that the Korean corporate boards are mainly operated by insiders. Furthermore, when the relative power of boards is greater than the management, the effects of inside directors, rather than overall directors, on R&D intensity are weakened.

A Qualitative Case Study on the Life Experiences of a Korean Woman in Germany -'Becoming-Work Migrant Woman'- (재독 한인여성의 생애체험에 대한 질적 사례연구 -'노동이주여성-되기' -)

  • Yang, Yeung Ja
    • Korean Journal of Social Welfare
    • /
    • v.68 no.1
    • /
    • pp.141-168
    • /
    • 2016
  • The research intends to analyse the life experiences of a Korean woman in Germany from the insider's view. Biographical data of A are analysed using Rosenthal's narrative-biographical interviews methode. Findings show that the life of A is in the process of 'becoming-work migrant woman', who jolts and 'deterritorializes' standard criteria of 'majority', which her colonize. Furthermore is analysed, that the 'becoming-work migrant women' as the construction of assemblage of 'becoming-worker', 'becoming-migrant', 'becoming-woman' is the fluid process of 'becoming-minority', which constructs constantly another assemblage of them, and is also the 'politics of difference' and the 'politics of becoming'. Based on the research results, some implications for social welfare practice are suggested.

  • PDF

The Relationship between Insider Ownership and Financial Policy (기업소유구조와 재무정책의 상호관련성에 관한 연구 - 자본구조, 투자 및 배당을 중심으로 -)

  • Cho, Ji-Ho;Kim, Chun-Ho
    • The Korean Journal of Financial Management
    • /
    • v.22 no.2
    • /
    • pp.1-41
    • /
    • 2005
  • In the literature, much research has been focused on the relationships between financial policies and corporate valuation, including the effects that internal equity and capital structure have on corporate value, as well as how capital structures, investments and dividends relate to one another. However, comprehensive studies considering three facets of financial policies, namely capital structures, investments, and internal equity altogether, are scant. This study follows 361 companies listed on the Korean Stock Exchange, excluding financial institutions, from 1996 to 2002. Using 3SLS methods, an empirical analysis was conducted of the relationships among capital structures, investments, dividends, and internal equity and the results are summarized. Capital structures were found to be negatively related with investments, while investments were mainly related to dividends. Dividends were positively related with internal equity, simultaneously affecting capital structures. We were not able to find any clear evidence of a direct relationship between internal equity and capital structures; however they seemed to be indirectly related. Thus, there seems to be mutual relationships between financial policies and internal equity.

  • PDF

Antecedents of Exploration Activities: Focused on Internal Ffactors (탐험활동의 선행요인: 기업 내부특성을 중심으로)

  • Lee, Hyo Jin;Huh, Moon-Goo
    • Journal of Technology Innovation
    • /
    • v.22 no.2
    • /
    • pp.105-129
    • /
    • 2014
  • In order to identify the antecedents of organization's exploration activities, this study focuses on internal factors. There are many theoretical and empirical studies for an organization's exploration activities, while the research on antecedents is limited. This study is aimed at the manufacturing industry in Korea from 1998 to 2012 using data from 15 years of slack, ownership structure, and TMT diversity. The study examined the impact of these firm-specific factors on firm's exploration activities. As a result, a company's exploration activities and slack have positive relationship. Between insider ownership and exploration activities, the hypothesis was not supported. Also, the relationship between TMT diversity and exploration activities was dismissed. Finally, based on the results of this analysis, the contribution of this study, limitations and implications are drawn.

Sleeping Beauty's Reflection: In and Out (잠자는 미녀의 숙고: 안과 밖)

  • Kim, Han-Seung
    • Korean Journal of Logic
    • /
    • v.13 no.1
    • /
    • pp.21-52
    • /
    • 2010
  • What van Fraassen calls 'Reflection Principle' is claimed to meet several counterexamples, one of which stands out in the form of the Sleeping Beauty problem. Adam Elga argues that what he believes is the correct answer to the Sleeping Beauty problem shows that Reflection is subject to counterexamples. David Lewis proposes a different answer which preserves Reflection intact. Recently, Nick Bostrom presents a hybrid view which is supposed to allow us to keep Reflection. In proposing his hybrid view Bostrom criticizes both Elga and Lewis while taking some 'good' parts from each. He claims that Elga's view is not entirely acceptable because it presupposes the 'Self-Indication Assumption'. I shall claim, however, that Elga could avoid Bostrom's criticisms by introducing Bostrom's notion of agent-part. I believe that several probability-related puzzles including the Sleeping Beauty problem indicate a promising view concerning the way we should regard our future selves' opinions. According to this view, whether one takes the outsider stance or insider stance makes a difference in an important way that one and the same proposition is associated with different degrees of belief by one agent.

  • PDF

Real-time Responses Scheme to Protect a Computer from Offline Surrogate Users and Hackers (오프라인 대리사용자 및 해커로부터 특정 컴퓨터 보호를 위한 실시간 대응방안)

  • Song, Tae-Gi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.313-320
    • /
    • 2019
  • One of the causes of many damage cases that occur today by hacking attack is social engineering attack. The attacker is usually a malicious traitor or an ignorant insider. As a solution, we are strengthening security training for all employees in the organization. Nevertheless, there are frequent situations in which computers are shared. In this case, the person in charge of the computer has difficulty in tracking and responding when a specific representative accessed and what a specific representative did. In this paper, we propose the method that the person in charge of the computer tracks in real time through the smartphone when a representative access the computer, when a representative access offline using hacked or shared authentication. Also, we propose a method to prevent the leakage of important information by encrypting and backing up important files of the PC through the smartphone in case of abnormal access.

Security Enhancement of Biometrics-based Remote User Authentication Scheme Using Smart Cards (스마트 카드를 이용한 생체인식 기반 원격 사용자 인증 스킴의 보안성 개선)

  • An, Young-Hwa;Joo, Young-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.231-237
    • /
    • 2012
  • In 2011, Das proposed an effective biometrics-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication, while eliminating the security drawbacks of Li-Hwang's scheme. In this paper, we have shown that Das's scheme is still insecure against several attacks and does not provide mutual authentication. Also, we proposed the enhanced scheme to overcome these security weaknesses, even if the secret information stored in the smart card is revealed. As a result of security analysis, the enhanced scheme is secure against user impersonation attack, server masquerading attack, off-line password guessing attack, and insider attack. And we can see that the enhanced scheme provides mutual authentication between the user and the server.

A Study on Conversion Security Control System for Industrial Security (산업보안을 위한 융합보안관제시스템에 관한 연구)

  • Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.1-6
    • /
    • 2009
  • Current paradigm of industrial security is changing into the effective operation and management from simple establishment of security equipments. If the physical security system(entry control system, video security system, etc.) and the IT integrated security control system are conversed, it makes us possible to prevent, disrupt and track afterwards the insider's information leakage through the risk and security management of enterprise. That is, Without the additional expansion of the existing physical security and IT security manpower, the establishment of systematic conversion security management process in a short time is possible and can be expected the effective operation of professional organization system at all times. Now it is needed to build up integrated security management system as an individual technique including the security event collection and integrated management, the post connected tracking management in the case of security accident, the pattern definition and real time observation of information leakage and security violation, the rapid judgement and response/measure to the attempt of information leakage and security violation, the establishment of security policy by stages and systematically and conversion security.

  • PDF

Secure and Efficient DB Security and Authentication Scheme for RFID System (RFID 시스템을 위한 안전하고 효율적인 DB 보안 및 인증기법)

  • Ahn, Rae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4C
    • /
    • pp.197-206
    • /
    • 2011
  • In the RFID system, bulk tag information is stored into the back-end database as plaintext format not ciphertext. In this case, the tags's private informations can be easily compromised by an external hacker or an insider attacker. If the private informations of tags disclosed by the attackers, it can occur serious privacy invasion problem. Recently the database(DB) security is an important issue to prevent the above DB compromised attack. However, DB security for RFID systeme has not been considered yet. If we use the DB security technique into the RFID system, the above described privacy invasion' problem can be easily prevented. Based on this motivation, this paper proposes a secure and efficient back-end database security and authentication(S-DB) scheme with XOR-based encryption/decryption algorithm. In the proposed scheme, all tag's private information is encrypted and stored by using the DB secret key to protect the DB compromised attack. As a result, the proposed S-DB scheme 'can provide stronger security and more efficiency for the secure RFID system environment.