• Title/Summary/Keyword: Policy Information Resources

Search Result 825, Processing Time 0.037 seconds

List of References for South Pacific Region Studies (남태평양 지역연구에 필요한 자료 목록)

  • Park, Byong-Kwon;Kwon, Moon Sang
    • Ocean and Polar Research
    • /
    • v.35 no.4
    • /
    • pp.465-489
    • /
    • 2013
  • We collected references on South Pacific Studies from several resources: mainly internet resources and periodicals. Internet resources include associations, organizations and societies; cultural resources; environmental issues; government data; information resources; journals and news letters; libraries, archives, publishers; news sources; other sources; regional issues; selected full text documents and digital resources; and statistics. Periodicals include news and popular interest magazines; regional magazines and general interest publications; and scholarly and professional journals.

A Heuristic Time Sharing Policy for Backup Resources in Cloud System

  • Li, Xinyi;Qi, Yong;Chen, Pengfei;Zhang, Xiaohui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3026-3049
    • /
    • 2016
  • Cloud computing promises high performance and cost-efficiency. However, most cloud infrastructures operate at a low utilization, which greatly adheres cost effectiveness. Previous works focus on seeking efficient virtual machine (VM) consolidation strategies to increase the utilization of virtual resources in production environment, but overlook the under-utilization of backup virtual resources. We propose a heuristic time sharing policy of backup VMs derived from the restless multi-armed bandit problem. The proposed policy achieves increasing backup virtual resources utilization and providing high availability. Both the results in simulation and prototype system experiments show that the traditional 1:1 backup provision can be extended to 1:M (M≫1) between the backup VMs and the service VMs, and the utilization of backup VMs can be enhanced significantly.

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

A Study on the Policy of New Government Science and Technology and the R&D Policy of Government Departments Related to Geoscience and Mineral Resources (신정부 과학기술 및 지질자원 관련 정부부처 R&D정책 분석)

  • Ahn, Eun-Young;Bae, Jun-Hee;Lee, Ok-Sun;Lee, Jae-Wook
    • Economic and Environmental Geology
    • /
    • v.51 no.3
    • /
    • pp.279-289
    • /
    • 2018
  • With the launch of the new government in 2017, National Planning and Advisory Committee (NPAC) announced the five-year plan for the government administration and the 100 national tasks. The Ministry of Science and ICT (Information & Communication Technology) (MSIT) and other government agencies issued work plans for 2018, including R&D plans. Analyzing the changes in government policy will be a major task of public research and development institutions. This study analyzed the changes of the R&D policy of the new government and the R&D policy direction and strategic plan of the government departments related to the geoscience and mineral resources in 2018. The results of the analysis are as follows: 1) to lead the innovation growth through the 4th industrial revolution, 2) to supply clean energy and to cope with climate change in the environment and energy field, 3) to improve the quality of life through problem solving in the life of the people and disaster prevention. Considering the investment direction of the government, it is necessary to lead the geoscience and mineral resources R&D to solve problems of the society and to grow by the science and technology.

A Factor Analysis on Tourism Satisfaction through Expected Effects on Tourism Resources Development and Tourism Development Policy

  • Choi, Rack-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.2
    • /
    • pp.109-116
    • /
    • 2018
  • By November 2017, the number of overseas travelers of the Korean nationals reached a cumulative total of 2,409,155, bringing about 26 million overseas travelers. For Korea's future growth and development, it is necessary to make the country much more attractive than now, and to enhance the competitiveness of the domestic tourism field and attract the people of the world. The purpose of this study is to analyze the satisfaction of tourism policy and to utilize it in the development of tourism policy through the empirical analysis of the satisfaction of the tourism resource development and the tourism development policy in Korea. The policy that can achieve the policy purpose pursued by the regional tourism resource development and the future regional tourism resource development and development policy plan were suggested. It is necessary to consider factors related to development of tourism resources such as policy factors, development factors, management factors, and environmental factors. Local tourism development policies should be made considering the factors related to tourism policy expectation, regional characteristics, cultural characteristics and environmental characteristics. In addition, the global competitiveness of the tourism industry and enterprises should be strengthened through the protection of companies and rationalization of tourism related regulations in relation to the opening and expansion of the global tourism market scale.

A Review on the Management of Water Resources Information based on Big Data and Cloud Computing (빅 데이터와 클라우드 컴퓨팅 기반의 수자원 정보 관리 방안에 관한 검토)

  • Kim, Yonsoo;Kang, Narae;Jung, Jaewon;Kim, Hung Soo
    • Journal of Wetlands Research
    • /
    • v.18 no.1
    • /
    • pp.100-112
    • /
    • 2016
  • In recent, the direction of water resources policy is changing from the typical plan for water use and flood control to the sustainable water resources management to improve the quality of life. This change makes the information related to water resources such as data collection, management, and supply is becoming an important concern for decision making of water resources policy. We had analyzed the structured data according to the purpose of providing information on water resources. However, the recent trend is big data and cloud computing which can create new values by linking unstructured data with structured data. Therefore, the trend for the management of water resources information is also changing. According to the paradigm change of information management, this study tried to suggest an application of big data and cloud computing in water resources field for efficient management and use of water. We examined the current state and direction of policy related to water resources information in Korea and an other country. Then we connected volume, velocity and variety which are the three basic components of big data with veracity and value which are additionally mentioned recently. And we discussed the rapid and flexible countermeasures about changes of consumer and increasing big data related to water resources via cloud computing. In the future, the management of water resources information should go to the direction which can enhance the value(Value) of water resources information by big data and cloud computing based on the amount of data(Volume), the speed of data processing(Velocity), the number of types of data(Variety). Also it should enhance the value(Value) of water resources information by the fusion of water and other areas and by the production of accurate information(Veracity) required for water management and prevention of disaster and for protection of life and property.

Developing a Basic Framework for the Korean National Collection Policy (국가장서개발정책 기본모형 연구)

  • Chang, Hye-Rhan;Hong, Hyun-Jin;Noh, Young-Hee;Oh, Eui-Kyung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.43 no.4
    • /
    • pp.193-215
    • /
    • 2009
  • A more sophisticated library collection policy is required due to the changing information environment. Both traditional resources and diversified networked information resources are increasing continuously. The National Library of Korea should construct a systematic collection development policy in order to fulfill its mission. The purpose of this study is to develop a basic framework that is intended to improve the coverage of national collection. Examining previous studies and the national collection development policies of major advanced countries, a model consisting of four sub-models has been proposed. It includes hybrid collection, cooperative linking collection, collection evaluation, and a collection policy statement. Details of the sub-models and strategies are described.

A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing

  • Jing Yixin;Kim, Jin-Hyung;Jeong, Dong-Won
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.28-33
    • /
    • 2006
  • The initial research of Task Computing in the ubiquitous computing (UbiComp) environment revealed the need for access control of services. Context-awareness of service requests in ubiquitous computing necessitates a well-designed model to enable effective and adaptive invocation. However, nowadays little work is being undertaken on service access control under the UbiComp environment, which makes the exposed service suffer from the problem of ill-use. One of the research focuses is how to handle the access to the resources over the network. Policy-Based Access Control is an access control method. It adopts a security policy to evaluate requests for resources but has a light-weight combination of the resources. Motivated by the problem above, we propose a universal model and an algorithm to enhance service access control in UbiComp. We detail the architecture of the model and present the access control implementation.

Implementation of Expert System Simulation based on 2th Security of Network (네트워크 2중 보안을 위한 전문가시스템 시뮬레이션의 구현)

  • Lee Chang-Jo
    • Management & Information Systems Review
    • /
    • v.4
    • /
    • pp.309-325
    • /
    • 2000
  • Organizations rely on Secure ID resources today to handle vast amounts of information. Because the data can vary widely in type and in degree of sensitivity, employees need to be able to exercise flexibility in handling and protecting it. It would not be practical or cost-effective to require that all data be handled in the same manner or be subject to the same protection requirements. Without some degree of standardization, however inconsistencies can develop at introduce risks. Policy formulation is an important step toward standardization of security activities for ID resources. ID security policy is generally formulated from the input of many members of an organization, including security officials, line managers, and ID resource specialists. However, policy is ultimately approved and issued by the organization's senior management. In environments where employees feel inundated with policies, directives, guidelines and procedures, an ID security policy should be introduced in a manner that ensures that management's unqualified support is clear. The organization's policy is management's vehicle for emphasizing the commitment to ID security and making clear the expectations for employee involvement and accountability. This paper will discuss ID security Policy in terms of the different types (program-level and issue-specific), components, and Implementation of Expert System Simulation based on 4GL, PowerBuilder.

  • PDF

Science and Technology Human Resource Capacity for Economic Growth: The Case of Korea

  • Park, Myungsoo
    • STI Policy Review
    • /
    • v.1 no.2
    • /
    • pp.19-31
    • /
    • 2010
  • This paper presents the policies Korea adopted to educate and train scientists/researchers and technicians/skilled workers. The Korean policies for the increase of human resources in science and technology that stimulated an upgrading of skills in industry and adapted to technical advancements are identified. An important factor is that the supply and demand mechanism created a virtuous circle so that the science and technology education and training policies were responsive to economic demands. In addition, policies to foster a human resource capacity have enhanced the contribution of human resources in science and technology for innovation and economic growth.