• Title/Summary/Keyword: Personal capability

Search Result 202, Processing Time 0.022 seconds

Rule-base Expert System for Privacy Violation Certainty Estimation (개인정보유출 확신도 도출을 위한 전문가시스템개발)

  • Kim, Jin-Hyung;Lee, Alexander;Kim, Hyung-Jong;Hwang, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.125-135
    • /
    • 2009
  • Logs from various security system can reveal the attack trials for accessing private data without authorization. The logs can be a kind of confidence deriving factors that a certain IP address is involved in the trial. This paper presents a rule-based expert system for derivation of privacy violation confidence using various security systems. Generally, security manager analyzes and synthesizes the log information from various security systems about a certain IP address to find the relevance with privacy violation cases. The security managers' knowledge handling various log information can be transformed into rules for automation of the log analysis and synthesis. Especially, the coverage of log analysis for personal information leakage is not too broad when we compare with the analysis of various intrusion trials. Thus, the number of rules that we should author is relatively small. In this paper, we have derived correlation among logs from IDS, Firewall and Webserver in the view point of privacy protection and implemented a rule-based expert system based on the derived correlation. Consequently, we defined a method for calculating the score which represents the relevance between IP address and privacy violation. The UI(User Interface) expert system has a capability of managing the rule set such as insertion, deletion and update.

A Study on the Activation Plan for Professional Sport League through Exploration of Inducing Factors of Match Fixing (승부조작 유발요인 탐색을 통한 프로스포츠 활성화 방안)

  • Bang, Shin-Woong;Park, In-Sil;Kim, Wook-Ki
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.3
    • /
    • pp.153-170
    • /
    • 2021
  • This study was attempted to derive strategic implications for activating professional sports by conducting in-depth interviews with professional sports officials such as players, teams, federations, agencies, etc., by searching for factors that cause match fixing and deriving preventive strategies based on them. Eight people with more than 3 years of experience working in professional sports were selected using the snowball sampling technique. Data were collected and analyzed by applying a semi-structured in-depth interview method for them. As a result of the analysis, five core categories (the learning effect from the cartel for entering university, the culture learned in a camp training, the manifestation of the latent learning effect, the negative effect of the human network, the personal disposition) were derived as factors causing match-fixing. As for the strategy to prevent match fixing, first, improving the college entrance examination system oriented on individual capability, second, improving the education system for student athlete, third, establishing a prevention system, fourth, continuing education, fifth, and activating the agent system as the core categories. Implications for the derived research results and future research directions were discussed.

Designing a Molecular Diagnostic Laboratory for Testing Highly Pathogenic Viruses (고병원성 바이러스 검사를 위한 분자진단검사실 구축)

  • Jung, Tae Won;Jung, Jaeyoung;Kim, Sunghyun;Kim, Young-Kwon
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.53 no.2
    • /
    • pp.143-150
    • /
    • 2021
  • The recent spread of novel and highly variant pathogenic viruses, including the coronavirus (SARS-CoV-2), has increased the demand for diagnostic testing for rapid confirmation. This has resulted in investigating the functional capability of each space, and preparing facility guidelines to secure the safety of medical technologists. During viral evaluations, there is a requirement of negative pressure facilities along with thread separation, during pre-treatment of samples and before nucleic acid amplification. Space composition therefore needs to be planned by considering unidirectional air flow. This classification of safety management facilities is designated as biosafety level 2, and personal protective equipment is placed accordingly. In case of handling dangerous materials, they need to be carried out of the biosafety cabinet, and sterilizers are required for suitable disposal of infectious agents. A common feature of domestic laboratories is maintenance of the sample pre-treatment space at a negative pressure of -2.5 Pa or less, and arranging separate pre-treatment and reagent preparation spaces during the test process. We believe that the data generated in this study is meaningful, and offers an efficient direction and detailed flow for separation of the inspection process and space functions. Moreover, this study introduces construction of the laboratory by applying the safety management standards.

ECG Compression and Transmission based on Template Matching (템플릿 매칭 기반의 심전도 압축 전송)

  • Lee, Sang-jin;Kim, Sang-kon;Kim, Tae-kon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.31-38
    • /
    • 2022
  • An electrocardiogram(ECG) is a recoding of electrical signals of the heart's cyclic activity and an important body information for diagnosing myocardial rhythm. Large amount of information are generated continuously and a significant period of cumulative signal is required for the purpose of diagnosing a specific disease. Therefore, research on compression including clinically acceptable lossy technique has been developed to reduce the amount of information significantly. Recently, wearable smart heart monitoring devices that can transmit electrocardiogram(ECG) are being developed. The use of electrocardiogram, an important personal information for healthcare service, is rapidly increasing. However, devices generally have limited capability and power consumption for user convenience, and it is often difficult to apply the existing compression method directly. It is essential to develop techniques that can process and transmit a large volume of signals in limited resources. A method for compressing and transmitting the ECG signals efficiently by using the cumulative average (template) of the unit waveform is proposed in the paper. The ECG is coded lovelessly using template matching. It is analyzed that the proposed method is superior to the existing compression methods at high compression ratio, and its complexity is not relatively high. And it is also possible to apply compression methods to template matching values.

A Structural Framework on Psychological Adaptation and Sequential Changes during the COVID-19 Pandemic (코로나19 팬데믹에 대한 심리적 적응과 연쇄적 변화의 구조 모형)

  • Ko, Dong-Woo;Seo, Hyun-Sook
    • Korean Journal of Culture and Social Issue
    • /
    • v.27 no.4
    • /
    • pp.351-389
    • /
    • 2021
  • This qualitative study aimed to develop a structural framework that explains the process of psychological adaptation and sequential changes being perceived by Korean people under the COVID-19 Pandemic past year. Setting a tentative analysis frame induced from antecedent literatures about psychological phenomena during the COVID-19 pandemic, the qualitative data were collected from 6 Korean adults by semi structured individual interviews. For the data, content analysis applied from the grounded theory were performed. As a result, the initial framework was extended and revised to describe the psychological phenomena under the pandemic. This paradigm structure includes the process of 'causal factors ⇒ psychological main phenomena ⇒ sequential results' being intervened by personal contextual situations and psychological characteristics, as moderators. The category of causal factors were the COVID-19 pandemic, relevant critical incidents, and social distancing policy. The main phenomena reflected either positive, negative, or complicated experiences. The sequential psychological results included transformation of cognitive system or behavior patterns. Various variables such as psychological sense of community and social responsibility, psychological capability for leisure, and positive psychological capital were found out as moderating factors. In discussion and conclusion, theoretical/practical implications of the results and direction to study in the future were suggested.

A Comparative Study of the Foreign Trade Strategies of Gaisong Merchants and Modern Companies in Korea. (현대기업과 개성상인의 해외진출전략의 비교분석)

  • Park, Sang-Gyu
    • Korean Business Review
    • /
    • v.17
    • /
    • pp.153-183
    • /
    • 2004
  • The Gaisong Merchants can be regarded to playa pioneering role to activate the Korea's trade with foreign countries. In the early period of Yi-Dynasty, the Gaisong Merchants focused on personal trade, but in the middle period of Yi-Dynasty, they entered to the realm of governmental trade. Furthermore, their business activities widened to various forms of trades, for example, smuggling. Utilizing accumulated capital, Gaisong merchants expanded their trading activities to their neighboring countries such as Japan and China. In recent times, it is necessary for modem Korean companies to diversify risks through the establishment of corporations for production, marketing and R&D abroad or through joint venture, M&A and strategic alliance with foreign companies in order to reduce the risks originated from volatile economic and political situations. In this study, we utilize tools of comparative study to compare Gaisong Merchants' foreign trade strategies with those of modem companies such as AMOREPACIFIC, HANILCEMENT and SHINDORICO. The purpose of the paper is to test the hypothesis that modem Korean companies grew up by following the cases of Gaisong Merchants' business activities. We summarize our main findings as follows. First, both Gaisong Merchants and modem Korean companies have common functional core capability in the field of marketing, manufacturing technology, R&D, and human resources development. Second, both Gaisong Merchants and modem Korean companies have common organizational core capability. Third, both Gaisong Merchants and modem Korean companies have common infrastructures such as planning, finance, accounting and MIS. It constitutes the infrastructure of Korea's foreign trade sector. Fourth, both Gaisong Merchants and modem companies have common organizational culture in the field of management policy and philosophy. Actually, those factors are evaluated to be driving forces of Koera's success in foreign trade. In conclusion, the business activities of Gaisong Merchants who represented the peculiarity of Korean business spirit are partially inherited to current Korean business management. The value system and behavior pattern of modern Korean companies is succeeded from the spirit of Gaisong Merchants and it playa major role to specify the identity of Korean business administration.

  • PDF

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

Effectiveness and characteristics of technology transfer consortia in public R&D sector: The case of Korean TT consortia (공공연구부문에서의 기술이전컨소시엄의 효과와 특성 연구: 공공기술이전컨소시엄 사례를 중심으로)

  • Park, Jong-Bok;Ryu, Tae-Kyu
    • Journal of Korea Technology Innovation Society
    • /
    • v.10 no.2
    • /
    • pp.284-309
    • /
    • 2007
  • Technology transfer (TT) consortium is an affiliation of two or more public research institutions (PRIs) that participate in a common technology transfer activity or pool their resources together, with the objective of facilitating technology transfer. Based on empirical analysis of five regional TT consortia (2002-2006) operating in Korea, this paper suggests their effectiveness by employing a TT performance index (TTPI) and identifies possible characteristics involved, such as motivations, facilitators, barriers, and challenges. TTPI devised in the paper is a new composite TT performance index to measure how much the TT performance of a PH changed in a designated year compared to a base year. All the performance indicators of TTPI are well-structured based on the unique TT process that is prevalent in Korea. Further, TTPI can bring different size and focus of PRIs to the same scale for comparison by double-normalizing. The paper tests the effectiveness of TT consortium for the escalation of TT performances in member PRIs by highlighting the differences of TTPI's between 2005 and 2001. As a result, the paper found that the escalation of TTPI for member PRIs was greater than that for non-member PRIs. As for the characteristics of TT consortia, their respective factors obtained by TT expert survey were computed with proportion tests of differences (Z tests) to compare two perspectives between intramural and extramural groups. One of key findings is that there is general homogeneity in stakeholder perspectives regarding motivations, facilitators, barriers, and challenges. Some notable responses are as follow; the most probable motivation to join TT consortium is to share or exchange TT competences for enhanced performance. Second, the most probable facilitator is professional capability of consortium-hired personnel. Third, the foremost probable barriers to effective TT consortium are frequent change of consortium director and passive participation of member PRIs. Lastly, both publicizing TT consortia and developing performance metrics are the most important for the improvement of TT consortia. The understanding of the characteristics of TT consortia increases the likelihood of accelerated success, because TT consortia path from formation to termination encompasses many concepts, processes, principles, and factors. Finally, an analysis of the survey data combined with expert interview and observation data led the authors to derive five conditions as being critical to viable TT consortia in Korea at early stage of technology transfer systems. These conditions include policy infrastructure, proactive participation, excellent professionals, personal motivation, and teaming mechanisms. It is expected that the Korean evidence is a starting point to develop and refine the theory of TT consortia and for additional studies in other countries.

  • PDF

Mobile Contents Transformation System Research for Personalization Service (개인화 서비스를 위한 모바일 콘텐츠 변환 시스템 연구)

  • Bae, Jong-Hwan;Cho, Young-Hee;Lee, Jung-Jae;Kim, Nam-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.119-128
    • /
    • 2011
  • The Sensor technology and portable device capability able to collect recent user information and the information about the surrounding environment haven been highly developed. A user can be made use of various contents and the option is also extending with this technology development. In particular, the initial portable device had simply a call function, but now that has evolved into 'the 4th screen' which including movie, television, PC ability. also, in the past, a portable device to provided only the services of a SMS, in recent years, it provided to interactive video service, and it include technology which providing various contents. Also, it is rising as media which leading the consumption of contents, because it can be used anytime, anywhere. However, the contents available for the nature of user's handheld devices are limited. because it is very difficult for making the contents separately according to various device specification. To find a solution to this problem, the study on one contents from several device has been progressing. The contents conversion technology making use of the profile of device out of this study comes to the force and profile study has been progressing for this. Furthermore, Demand for a user is also increased and the study on the technology collecting, analyzing demands has been making active progress. And what is more, Grasping user's demands by making use of this technology and the study on the technology analyzing, providing contents has been making active progress as well. First of all, there is a method making good use of ZigBee, Bluetooth technology about the sensor for gathering user's information. ZigBee uses low-power digital radio for wireless headphone, wireless communication network, and being utilized for smart energy, automatic home system, wireless communication application and wireless sensor application. Bluetooth, as industry standards of PAN(Personal Area Networks), is being made of use of low power wireless device for the technology supporting data transmission such as drawing file, video file among Bluetooth device. With analyzing the collected information making use of this technology, it utilizes personalized service based on network knowledge developed by ETRI to service contents tailor-made for a user. Now that personalized service builds up network knowledge about user's various environments, the technology provides context friendly service constructed dynamically on the basis of this. The contents to service dynamically like this offer the contents that it converses with utilizing device profile to working well. Therefore, this paper suggests the system as follow. It collects the information, for example of user's sensitivity, context and location by using sensor technology, and generates the profile as a means of collected information as sensor. It collects the user's propensity to the information by user's input and event and generates profile in the same way besides the gathered information by sensor. Device transmits a generated profile and the profile about a device specification to proxy server. And proxy server transmits a profile to each profile management server. It analyzes profile in proxy server so that it selects the contents user demand and requests in contents server. Contents server receives a profile of user portable device from device profile server and converses the contents by using this. Original source code of contents convert into XML code using the device profile and XML code convert into source code available in user portable device. Thus, contents conversion process is terminated and user friendly system is completed as the user transmits optimal contents for user portable device.

Analysis and countermeasure of causes of inducing violence of private security companies on the actual sites of administrative execution by proxy (행정대집행 현장에서 민간경비업체의 폭력 유발 원인 분석과 대책)

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.119-141
    • /
    • 2009
  • Administrative execution by proxy is one of forced executions of administration and is also called as "enforced execution by proxy" in which administration institutions or the third party executes by proxy on behalf of parties who did not execute obligations under administration law and files claims to compensate expenses required in the proxy execution. Despite the actual site of administrative execution by law, social problems are generated because various violence and behaviors of infringement of human rights between executer and obligator are rampant and thus causing human damages since forced execution by physical force is carried out and cases of police indictments and petition to human rights committee are gradually increasing. Majority of people mobilized in this actual site of violence are supplied by private security companies which provide service contract and mobilization of people without qualification of guards or security service and irrational execution by proxy and violent actions by so-called service hooligans connected to violence organizations are now becoming social issues. In these actual sites of violence, structurally very complicated problems such as economic rights, right of residence, struggle for living, and intervention by outsiders are contained. This thesis has analyzed causes of outbreaks of violence and discussed about improvement countermeasure by paying attention to mobilization of people by private security companies. As the result, through revision and improvement of laws and systems, execution institution and policemen must be present at actual sites of execution by proxy to control physical execution of private security companies to be carried out legally and when violent collisions are occurring, it shall be stipulated that police should immediately intervene. Practices of execution by proxy of execution administration institutions shall be avoided and causes of occurrences of violence shall be eliminated by discrete decisions of execution by proxy, elimination of service contract conditions focused on accomplishments, and stipulation of responsibility of execution institutions when problems occur. Practices of solving petitions through collective actions of obligators shall be eliminated and strict enforcement of laws such as disturbance of official execution or compensation claims for expenses of execution by proxy must be carried out and intervention by the third parties must be intercepted. Mobilization of manpower by security companies shall be limited to people with prior registration who have acquired and finished qualification and education by security business law and before putting them on actual sites, it shall be obliged that execution plan with clear written records of working location, mission, and work rules must be submitted in advance to police station in charge and also they must be controlled to follow laws and statutes such as uniform and equipments. In addition, personal criminal responsibility for violent actions must be clearly stipulated and advanced securing soundness of security companies such as limits of service contracts with records of accidents is required. Order placement behaviors of special organizations under the pretext of rehabilitation business must be eradicated and companies with capability and strong intention of observation of laws must be able to receive orders by intercepting chains of contracts and sub-contracts. Issues of improvement countermeasure of social problem, living, and compensation including rights of residence and environment are excluded from the discussion.

  • PDF