• Title/Summary/Keyword: Policy Convergence

Search Result 8,455, Processing Time 0.036 seconds

A Study on Policy Support for Emergency Relief Grant for COVID-19 through Causal Loop Analyses (인과지도 분석을 통한 코로나-19의 소상공인 정책지원 연구)

  • Suh, Kyung-Do;Choi, Jung il;Choi, Pan-Am;Jung, Jaerim
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.531-539
    • /
    • 2022
  • The government enforced policies such as social distancing and limiting business hours to prevent the spread of COVID-19. However, the impact of the long-term COVID-19 pandemic is causing more serious difficulties for small business owners. The government intended to relieve the business management pressure for small business owners by drawing up the COVID-19 emergency disaster relief funds. The funds provided temporary support for the small business owners, but the prolonged pandemic worsened the business management difficulties. Therefore, this study will apply fixes that fail and shifting the burden archetypes from the system archetype of system thinking for the exploratory deduction of policy measures as the policy leverage to effectively enhance the recovery of small business owners. In response to the situation, emergency financial aid for small business owners and support that can enhance the self-sustaining powers are required to heighten the recovery of small business owners.

The Effect of Organization's Industrial Security Management on Employees' Security Policy Compliance Intention (조직의 산업보안 활동이 구성원의 보안 정책 준수 의도에 미치는 영향)

  • Donghwan Lee;Seungwook Park
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.57-68
    • /
    • 2022
  • As the importance and awareness of security have recently expanded, companies and governments are making continuous efforts and investments for security management. However, there are still many security threats in the organization, especially security incidents caused by internal staff. Therefore, it is very important for members to comply with security policies for organizational security management. Therefore, this study classified industrial security management into technical security, physical security, and managerial security, and applied the theory of planned behavior to investigate the impact relationship on the intention to comply with security policies. SPSS 25 and AMOS 25 were used for statistical analysis, and the study found that technical security had a positive(+) effect on subjective norms, physical security had a positive(+) effect on perceived behavior control, and attitude and perceived behavior control had a positive(+) effect on security policy compliance intention.

The Effect of Theory of Planned Behavior of Customized Cosmetics According to Selection Attributes on Purchase Satisfaction Behavioral Intention (선택속성에 따른 맞춤형화장품의 계획행동이론이 구매만족행동의도에 미치는 영향)

  • Kim, So-Ye;Baek, Won-Jin;Kim, Hyeon-Gyeong;Han, Chae-Jeong
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.3
    • /
    • pp.222-235
    • /
    • 2022
  • The Government provides a financial assistance to stimulate firm R&D and innovation activities. Previous papers on the impact of public subsidies on firm R&D investments mainly had a focus on an individual policy tool regardless of potential impacts of other policy instruments. This study addresses this gap by examining the effects of policy mix regarding a subsidy and a tax credit. The empirical analyses from fixed effect model using Survey on Technology of SMEs 2015-2017 revealed valuable points. First, policy mix induces more R&D investment of SMEs, which in turn, shows a complementary relationship between two instruments. Second, even if impact of tax credit controlled, subsidy is positively associated with SMEs R&D investment. These findings justify policy mix interventions to promote SME R&D activity. Moreover, grants can be applied as a more useful policy tool for SMEs that are constrained by resources and capabilities.

A Study on Convergence Curriculum Development for Idea Creation (아이디어 창작을 위한 융합 교육 과정 개발에 관한 연구)

  • Jang, Ji-Yeun;Lee, Keun-Ho;Yun, Sung-Hyun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.571-576
    • /
    • 2014
  • Convergence refers to create a new one by combining the different elements of two or more. Currently convergence has expanded academy, industry and education from the concept of combining heterogeneous inter-technology. The most important key to the convergence in success is to derive ideas for problem solving. However, the idea derivation is done in companies to hire professional people for letting the innovation of corporate planning and new product in most cases. It is hard to get the expected results of convergence's variety. In this research, the creation of the general public for their ideas is main focus on developing a curriculum. Development models are: 1) strengthening the internal capacity for creative thinking, 2) curriculum meets the consumer 3) an understanding of convergence technology 4) creative ideas and planning ability is composed of four concepts. It is expected that convergence man power having the creative idea is trained in case of applying the proposed education model to the convergence education.

A Study on a Convergence Education System to Improve University Students' Life Competencies (대학생의 생애역량 강화를 위한 융복합형 교육시스템 모색)

  • Kim, Bu-Ja;Kim, Jun-Whai
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.173-180
    • /
    • 2014
  • Life competencies most required for university students, who receive a higher education and prepare to go into society, are job competencies. People with a variety of competencies are needed in the job market in a globally-oriented 21st-Century knowledge-based society. Now that raising competent people who have a high level of job competency is regarded as one of university functions, a way to improve job competencies through university education needs to be investigated. This study proposes a convergence education system to improve job competencies. The convergence education system includes five type of convergence: convergence in major fields of study, convergence in education courses, convergence in education space, convergence in education methods, and convergence in education period. This education system is expected to improve a variety of job competencies including cognitive competencies, non-cognitive competencies, and global competencies.

An Exploratory Study on Convergence generation according to the convergence level estimation of Digital Device and Service (디지털기기와 디지털서비스의 컨버전스 수준 평가에 따른 컨버전스 세대의 탐색적 고찰)

  • Kim, Yeon-Jeong
    • Journal of Digital Convergence
    • /
    • v.9 no.4
    • /
    • pp.169-179
    • /
    • 2011
  • The purpose of this study are as follows. First, to analyze digital convergence level of convergence generation to demographic variables. Second, the convergence level to digital device and using frequency to digital service. Third, the convergence level to digital service and using frequency to digital service. The research methods FGI, the interview with IT expert group and survey. The results of research are as follows. First, 30 aging, expert group, higher education group over graduate school are actively using and participated. Second, high level of convergence device are smart-phone, tablet PC, net-book are in order. high level of convergence service are SNS service, twitter, uee, portal messenger and app store, e-Book, web hard are in order. Third, The convergence generation enjoying app-store of smartphone, wireless game and more participating facebook/cyworld twitter, Portal, internet community.

Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things (해시를 활용한 사이버킬체인 기반의 사물인터넷 보안 정책)

  • Jeong, So-Won;Choi, Yu-Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.179-185
    • /
    • 2018
  • Technology of Internet of Things (IoT) which is receiving the spotlight recently as a new growth engine of Information Communications Technology (ICT) industry in the $4^{th}$ Industrial Revolution needs trustworthiness beyond simple technology of security. IoT devices should consider trustworthiness from planning and design of IoTs so that everyone who develop, evaluate and use the device can measure and trust its security. Increased number of IoTs and long lifetime result in the increased securituy vulnerability due to the difficulty of software patch and update. In this paper, we investigated security and scalability issues of current IoT devices through research of the technical, political and industrial trend of IoT. In order to overcome the limitations, we propose an automatic verification of software integrity utilizing and a political solution to apply cyber killchain based security mechanism using hash which is an element technology of blockchain to solve these problems.

A Cloud Adoption Method of Public Sectors using a Convergence Decision-making Model (융합의사결정모델을 이용한 공공기관의 클라우드 도입 방법)

  • Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.15 no.11
    • /
    • pp.147-153
    • /
    • 2017
  • The Korean government has implemented various policies to introduce the cloud to the public sector. The objectives of the paper are to develop a decision-making model and to propose the roadmap for cloud introduction in the public sector. To achieve these objectives, we analyze the characteristics of public services and types of cloud service. Then we develope a cloud introduction method using fuzzy AHP based convergence decision-making model. As a result of this study, we decided to prioritize the cloud service candidates and proposed a three-step roadmap. The results are expected to contribute to cloud introduction and transition in the public sector and establishment of the cloud policy. In the future, it will be necessary to develop budget plans as well as additional decision-making factors for cloud adoption.

Access Control Mechanism based on MAC for Cloud Convergence (클라우드 융합을 위한 MAC 정책 기반 접근통제 메커니즘)

  • Choi, Eun-Bok;Lee, Sang-Joon
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.1
    • /
    • pp.1-8
    • /
    • 2016
  • Cloud computing technology offers function that share each other computer resource, software and infra structure based on network. Virtualization is a very useful technology for operation efficiency of enterprise's server and reducing cost, but it can be target of new security threat when it is used without considering security. This paper proposes access control mechanism based on MAC(Mandatory Access Control) for cloud convergence that solve various problem that can occur in cloud environment. This mechanism is composed of set of state rules, security characteristics and algorithm. Also, we prove that the machine system with access control mechanism and an initial secure state is a secure system. This policy module of mechanism is expected to not only provide the maintenance but also provide secure resource sharing between virtual machines.

Real-time hacking, detection and tracking ICT Convergence Security Solutions Test and Evaluation (실시간 해킹, 탐지 및 추적관리 ICT 융합 보안 솔루션 시험평가)

  • Kim, Seung-Bum;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.235-246
    • /
    • 2015
  • Understanding the various unspecified hacking and repeated cyber DDoS attacks, finally was able to find a solution in the methods of attacks. Freely researching approach that combines the attacker and defender, offensive and defensive techniques can be called a challenge to discover the potential in whimsy. In this paper we test and evaluate "KWON-GA", global white hackers team has made by many years of experiences in infiltration and diagnosis under guise of offence is the best defence. And it is knowledge information ICT Convergence security solution which is developed for the purpose of defence, it provide customization policy that can be fit to customer's system environment with needed techniques and it is processed with unique proprietary technology so that it's not possible to scan. And even if it has leaked internally it's impossible to analyze so hackers can't analyze vulnerability, also it can't be abused as hacking tools.