• 제목/요약/키워드: Policy Convergence

검색결과 8,443건 처리시간 0.03초

유비쿼터스 기반 공공서비스 활성화에 관한 연구 (A Study on Vitalization of Public Service based on Ubiquitous Computing)

  • 노규성;윤태근;주성환
    • 디지털융복합연구
    • /
    • 제9권5호
    • /
    • pp.203-213
    • /
    • 2011
  • 본 연구는 국민 친화적인 공공서비스를 발굴하고, 유비쿼터스 관련 산업의 발전을 도모하고자 우리나라에서 정책적으로 추진하고 있는 u-공공서비스의 정책 현황을 살펴보고, 본 정책의 계속적인 활성화를 위한 비전 및 추진전략을 제시하고자 한다. 따라서 첫째, 본 연구는 u-기반 공공서비스 활성화 방안을 마련하고, 둘째, 실용중심의 핵심과제를 발굴하며, 셋째, 향후 u-공공서비스 활성화를 위한 산 학 연 관 협력 체제를 도출하는 데 목적이 있다.

농수산물 유통정책의 위기관리에 따른 커뮤니케이션전략에 관한 연구 - 유통정책 갈등해소에 대한 스캐닝, 모니터링을 중심으로 (A Study on the Communication Strategy to Risk Management of Agri-marine Products Distribution Policy)

  • 김만기
    • 디지털융복합연구
    • /
    • 제6권1호
    • /
    • pp.63-73
    • /
    • 2008
  • The present study attempted to explore effective scanning and monitoring in process of risk management on agri-marine products distribution policy. The interest public's group interests clash in accordance with theme for issue on marking policy. For executing a better systematic scanning and monitoring on actual affairs of marketing, selecting information personnel, gathering and analysing information, issue and risk management and their valuation with ongoing and simultaneously. Especially, In order to explore effective scanning and monitoring as a model of risk management, the study attempted to analyze within and without environment of marketing, to analyze issue management strategy, to evaluate issue activity for likelihood and impact, risk cycle analysis, interest public's group concerned, grade of interest public's group threatened(power, legitimacy, willingness), rapport(staying close, credibility, meeting expectation). And the study make an ongoing observation progress of subjects, and the serious subjects need have made an close observation. The study suggested to establish friendly relationship between organization and interest public's group, and to regularly accomplish two-way symmetric communication.

  • PDF

미정부의 빅데이터를 위한 보안정책 (The Security Policy for Big data of US Government)

  • 홍진근
    • 디지털융복합연구
    • /
    • 제11권10호
    • /
    • pp.403-409
    • /
    • 2013
  • 본 논문은 미국 정부의 빅데이터 정책과 보안 이슈에 관해 고찰하였다. 빅데이터 R&D 이니셔티브 전략과 계획, NITRD 프로그램, 정부기관의 빅데이터 전략을 소개하였고, 또한 미군에서 빅데이터 운용환경, 군사 작전에 사용되는 빅데이터 정보, 주요 연구기관과 주제, 보안가이드라인 등에 대해 살펴보았다.

경영자의 재량적 배당정책(配當政策)이 기업가치(企業價値)에 미치는 영향(影響)에 관(關)한 연구(硏究) (A Study on the Effect of Discretionary Dividend Policy by Management on the Firm Value)

  • 김영규;이석환;박형중
    • 산업융합연구
    • /
    • 제2권1호
    • /
    • pp.3-22
    • /
    • 2004
  • The purpose of this study is to examine the relationship between discretionary policy for minor shareholders and the firm value. It is assumed that the favorable dividend policy for minor shareholders would affect the firm value positively. The empirical results have indicated that the favorable dividend policy for minor shareholders has a positive affect on the firm value, also it show the proportion of inside equity holders and the proportion of management equity holders have significant effect on the firm value.

  • PDF

Considering Read and Write Characteristics of Page Access Separately for Efficient Memory Management

  • Hyokyung Bahn
    • International journal of advanced smart convergence
    • /
    • 제12권1호
    • /
    • pp.70-75
    • /
    • 2023
  • With the recent proliferation of memory-intensive workloads such as deep learning, analyzing memory access characteristics for efficient memory management is becoming increasingly important. Since read and write operations in memory access have different characteristics, an efficient memory management policy should take into accountthe characteristics of thesetwo operationsseparately. Although some previous studies have considered the different characteristics of reads and writes, they require a modified hardware architecture supporting read bits and write bits. Unlike previous approaches, we propose a software-based management policy under the existing memory architecture for considering read/write characteristics. The proposed policy logically partitions memory space into the read/write area and the write area by making use of reference bits and dirty bits provided in modern paging systems. Simulation experiments with memory access traces show that our approach performs better than the CLOCK algorithm by 23% on average, and the effect is similar to the previous policy with hardware support.

국무총리실의 정책조정 성과와 함의 (The Performance and Implication of Policy Coordination of Prime Minister's Office)

  • 하민철
    • 디지털융복합연구
    • /
    • 제11권3호
    • /
    • pp.73-83
    • /
    • 2013
  • 효과적인 정책조정은 성공적인 정책 추진의 필수적 요소이다. 한국 정부는 정책조정을 효과적으로 수행하기 위해 지난 35년간 국무총리실 내에 정책조정시스템을 발전시켜왔다. 국무총리실은 정책조정 규칙과 절차 등 제도적 장치들을 체계화하였고, 정책조정 담당자들의 조정 역량의 전문성을 강화해왔다. 그리고 정책조정 담당자들은 다양한 전략들을 활용하면서 정책조정 과업을 성공적으로 수행해왔다. 그 결과 국무총리실에 의뢰된 정책갈등 과제 중 90%의 과제들을 성공적으로 조정하였고, 85%의 과제들을 6개월이라는 짧은 기간 내에 마무리하였다. 이와 같은 성공적인 정책조정은 정부 전체적으로 정책갈등으로 인한 여러 부정적인 문제들을 완화시키는 효과를 가져왔다. 이 연구는 국무총리실의 정책조정의 성과를 검토하고 그 함의를 탐색하는 것을 목적으로 한다. 이를 위해 연구자는 김대중 정부와 노무현 정부 시기에 발간된 8권의 정책조정백서에 수록된 429개의 정책갈등 과제들을 분석하였다.

보안 코딩 지침의 사례 (Case of Security Coding Guide)

  • 신성윤;이상원;이현창
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2015년도 제52차 하계학술대회논문집 23권2호
    • /
    • pp.77-78
    • /
    • 2015
  • 본 논문에서는 S/W 개발 보안 지침의 사례로서 SQL 삽입에 대하여 설명한다. SQL 삽입은 입력 데이터 검증 및 표현에서 S/W 취약점 유형의 하나이다. 본 논문에서는 SQL 삽입에서 취약점 설명, 취약점 개념도, 보안 대책, 그리고 코드 예제까지 설명하도록 한다.

  • PDF

Migration Using Reordering Recovery in Wired/Wireless Networks

  • 이동춘
    • 융합보안논문지
    • /
    • 제7권4호
    • /
    • pp.115-121
    • /
    • 2007
  • 유/무선 망에서 통신 노드 간에 통신 실패로 이동 에이전트는 비록 망에서 일시적인 정보 서비스를 이용 할지 모르지만 모든 전송 정보가 블록되고 만다. 이러한 문제를 해결하기 위해 본 논문은 모바일 에이전트가 원할 한 전송을 보장받기 위한 경로 재순서 방법을 제안한다.

  • PDF

기술융합의 세계적 추세와 한국의 현황 비교분석 (A Comparative Study on the Trend of Technological Convergence)

  • 이준영;김도현;안세정;권오진;문영호
    • 대한산업공학회지
    • /
    • 제39권3호
    • /
    • pp.222-232
    • /
    • 2013
  • In recent years, 'technological fusion or convergence' has drawn a lot of attention of innovation researchers and governmental policy makers as the driving force of technological innovation and industrial growth. There are, however, few studies on the analysis of longitudinal trends of technological convergence and its comparison between global and national level. In this study, with the citation data of about 18 million articles, we analyzed 1) the growth of representative convergence research areas, 2) the convergence of citing patterns between research fields, and 3) the changing trend of diversity index of all research fields. We conclude that technological convergence in korea shows the relatively strong orientation to the combination of neighboring fields than that of heterogenous fields in comparison to global trend. In particular, the relatively weak activity of cognitive science and the low level of mutual exchange between arts/humanities/social sciences and natural/engineering sciences in Korea are emphasized.

특허 마이닝을 이용한 국방관련 국제특허분류 개선 방안 연구 (A Study on the Improvement of the Defense-related International Patent Classification using Patent Mining)

  • 김경수;조남욱
    • 품질경영학회지
    • /
    • 제50권1호
    • /
    • pp.21-33
    • /
    • 2022
  • Purpose: As most defense technologies are classified as confidential, the corresponding International Patent Classifications (IPCs) require special attention. Consequently, the list of defense-related IPCs has been managed by the government. This paper aims to evaluate the defense-related IPCs and propose a methodology to revalidate and improve the IPC classification scheme. Methods: The patents in military technology and their corresponding IPCs during 2009~2020 were utilized in this paper. Prior to the analysis, patents are divided into private and public sectors. Social network analysis was used to analyze the convergence structure and central defense technology, and association rule mining analysis was used to analyze the convergence pattern. Results: While the public sector was highly cohesive, the private sector was characterized by easy convergence between technologies. In addition, narrow convergence was observed in the public sector, and wide convergence was observed in the private sector. As a result of analyzing the core technologies of defense technology, defense-related IPC candidates were identified. Conclusion: This paper presents a comprehensive perspective on the structure of convergence of defense technology and the pattern of convergence. It is also significant because it proposed a method for revising defense-related IPCs. The results of this study are expected to be used as guidelines for preparing amendments to the government's defense-related IPC.