• Title/Summary/Keyword: Policy Information Resources

Search Result 824, Processing Time 0.034 seconds

Applying the Policy scheme to the IntServ

  • Song, Wang-Cheol
    • Journal of information and communication convergence engineering
    • /
    • v.1 no.3
    • /
    • pp.109-114
    • /
    • 2003
  • There is an emergence of Internet applications that have real-time requirements. These applications require IP to support guaranteed capacity, higher priority and lower packet loss rate. To address this, the Internet Engineering Task Force (IETF) is developing a set of protocols and standards for Integrated Services on the Internet. Using RSVP and policies to manage the allocation of network resources in order to provide different levels of service is a topic of great interest to service providers. Currently, it is not possible to dynamically reallocate resources during an application's session. This paper discusses how policies in conjunction with new service class can provide a more enhanced network resource allocation by allowing for this dynamic reallocation.

Application of Bayesian Networks for Flood Risk Analysis (베이지안 네트워크를 적용한 홍수 위험도 분석)

  • SunWoo, Woo-Yeon;Lee, Kil-Seong;Chung, Eun-Sung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.467-467
    • /
    • 2012
  • As the features of recent flood are spatially concentrated, loss of life and property increase by the impact of climate change. In addition to this the public interest in water control information is increased and socially reasonable justification of water control policy is needed. It is necessary to estimate the flood risk in order to let people know the status of flood control and establish flood control policy. For accurate flood risk analysis, we should consider inter-relation between causal factors of flood damage. Hence, flood risk analysis should be applied to interdependence of the factors selected. The Bayesian networks are ideally suited to assist decision-making in situations where there is uncertainty in the data and where the variables are highly interlinked. In this research, to provide more proper water control information the flood risk analysis is performed using the Bayesian networks to handle uncertainty and dependency among 13 specific proxy variables.

  • PDF

Renewable energy deployment policy-instruments for Cameroon: Implications on energy security, climate change mitigation and sustainable development

  • Enow-Arrey, Frankline
    • Bulletin of the Korea Photovoltaic Society
    • /
    • v.6 no.1
    • /
    • pp.56-68
    • /
    • 2020
  • Cameroon is a lower middle-income country with a population of 25.87 million inhabitants distributed over a surface area of 475,442 ㎢. Cameroon has very rich potentials in renewable energy resources such as solar energy, wind energy, small hydropower, geothermal energy and biomass. However, renewable energy constitutes less than 0.1% of energy mix of the country. The energy generation mix of Cameroon is dominated by large hydropower and thermal power. Cameroon ratified the Paris Agreement in July 2016 with an ambitious 20% greenhouse gas (GHG) emission reduction. This study attempts to investigate some renewable energy deployment policy-instruments that could enable the country enhance renewable energy deployment, gain energy independence, fulfill Nationally Determined Contribution (NDC) and achieve Sustainable Development Goals. It begins with an analysis of the status of energy sector in Cameroon. It further highlights the importance of renewable energy in mitigating climate change by decarbonizing the energy mix of the country to fulfill NDC and SDGs. Moreover, this study proposes some renewable energy deployment policy-solutions to the government. Solar energy is the most feasible renewable energy source in Cameroon. Feed-in Tariffs (FiT), is the best renewable energy support policy for Cameroon. Finally, this study concludes with some recommendations such as the necessity of building an Energy Storage System as well a renewable energy information and statistics infrastructure.

4P Model for Strategic Research Planning: Focusing on the Cases of Korea Research Institute of Chemical Technology

  • Choi, Kyungsun;Choe, Hochull;Ko, Youngjoo
    • Asian Journal of Innovation and Policy
    • /
    • v.7 no.2
    • /
    • pp.287-309
    • /
    • 2018
  • The demand for efficient utilization of input resources and productive outcomes is increasing as the government's R&D investments in Government-funded research institutes (GRIs) expand. These changes call for improving research-planning activities, which are defined as a set of activities wherein objectives are established, strategies for acquisition and expenditures of research resources are devised, and utilizations of research outcomes are addressed. This study introduces the integrated 4P analysis model that identifies the relationships among patents, papers, products, and projects. It looks into 4P analysis structure and its efficiency as a research planning means through case studies of the Korea Research Institute of Chemical Technology. This study introduces 4P analysis applied to KRICT, which can be utilized for outcome-oriented research planning of GRIs. At the same time, it investigates into the benefits and implications of 4P analysis. It proffers policy suggestions on such aspects as how research planning of GRIs should go through changes in a strategic and systematic way.

Patent Analysis for Aquaculture (수산 증·양식 분야에 대한 특허 분석)

  • Oh, Jung-Han;Kim, Min-Ju
    • The Journal of Fisheries Business Administration
    • /
    • v.45 no.2
    • /
    • pp.1-13
    • /
    • 2014
  • This study analyzes patent trends regarding farming-related technologies such as breeding or nursery technology, production systems, and new cultivation methods in order to provide objective patent information about the trends of R&D on marine products' proliferation or farming. Presently, in Korea, we try to secure marine living resources through the formation of artificial resources instead of environmental improvement policy or resource management policy. However, this is not about eliminating the causes of marine environment destruction but just the policy for improvement, so it is needed to revise the related policy with more ultimate measures. And it is necessary to develop technology that can secure the rights by integrating patent application strategies from the stage of R&D for medicine that can be utilized in chief farming countries and provide intensive support for the research centering around strategic varieties for farming in each region as well as strategic national farming varieties afterwards. Also, the analysis shows that it is urgent to make applications overseas based on domestic applications in order to develop technology that can be commercialized in not just Korean but overseas market as well.

Consumer’s Willingness To Pay for Residential Water and It’s Policy Implication (생활용수에 대한 소비자의 지불의사 추정 및 정책적 의미)

  • Park Doo-Ho;Park Yoon-Shin;Lee Gwang-Man
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.7 s.168
    • /
    • pp.563-574
    • /
    • 2006
  • Economic theory tell us, consumers always make a choice to maximize their utility. In the market system, consumers' choices are revealed and policy maker taking into account the aggregated consumers choice such as price, supply and demand. However, water resources as a public goods, therefore typically there is no market and does no aggregated information for residential water use. This study explore the consumers' willingness to pay for higher quality for residential water. Over 1,000 households responded for this survey and willingness to pay has been estimated. Furthermore, consumers' behaviors of residential water are examined. Consumers are willing to reduce the amount of water use with more than 50% of increasing water price, but stay almost constant with less than 25% of increasing which mean that current price level is not high enough to derive water saving. If consumers can have better quality of water, they willing to pay additional 16%, $153\;won/m^3/month$, more than their current price. Based on the derived information, we suggested policy direction for residential water policy.

Investigate the Roles of Sanctions, Psychological Capital, and Organizational Security Resources Factors in Information Security Policy Violation

  • Ayman Hasan Asfoor;Hairoladenan kasim;Aliza Binti Abdul Latif;Fiza Binti Abdul Rahim
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.863-898
    • /
    • 2023
  • Previous studies have shown that insiders pose risks to the security of organisations' secret information. Information security policy (ISP) intentional violation can jeopardise organisations. For years, ISP violations persist despite organisations' best attempts to tackle the problem through security, education, training and awareness (SETA) programs and technology solutions. Stopping hacking attempts e.g., phishing relies on personnel's behaviour. Therefore, it is crucial to consider employee behaviour when designing strategies to protect sensitive data. In this case, organisations should also focus on improving employee behaviour on security and creating positive security perceptions. This paper investigates the role of psychological capital (PsyCap), punishment and organisational security resources in influencing employee behaviour and ultimately reducing ISP violations. The model of the proposed study has been modified to investigate the connection between self-efficacy, resilience, optimism, hope, perceived sanction severity, perceived sanction certainty, security response effectiveness, security competence and ISP violation. The sample of the study includes 364 bank employees in Jordan who participated in a survey using a self-administered questionnaire. The findings show that the proposed approach acquired an acceptable fit with the data and 17 of 25 hypotheses were confirmed to be correct. Furthermore, the variables self-efficacy, resilience, security response efficacy, and protection motivation directly influence ISP violations, while perceived sanction severity and optimism indirectly influence ISP violations through protection motivation. Additionally, hope, perceived sanction certainty, and security skills have no effect on ISP infractions that are statistically significant. Finally, self-efficacy, resiliency, optimism, hope, perceived severity of sanctions, perceived certainty of sanctions, perceived effectiveness of security responses, and security competence have a substantial influence on protection motivation.

National Projects for Preservation and Long-term Access to Internet Resources (인터넷자원의 보존 및 장기적 이용을 위한 국가 프로젝트)

  • Lee, Jae-Yun;Cho, Hyun-Joo
    • Journal of Information Management
    • /
    • v.29 no.3
    • /
    • pp.27-42
    • /
    • 1998
  • Responding to the growing trend of Internet information resources, national policies to develop, preserve, and supply those resources are needed. The purpose of this paper is mainly to review and analyze some cases of foreign countries, and to build a model for national policy on internet archive in Korea.

  • PDF

Value Chain Analysis on Business Difficulties of Information Security Industry (가치사슬분석을 통한 지식정보보안산업의 애로사항 분석)

  • Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.12 no.1
    • /
    • pp.229-245
    • /
    • 2013
  • The information security industry market is sluggish despite high expectation for its growth, and thus policies are required to define the causes and to address these issues. The policy formulation requires various historical market and human resource data for analyzing the industry, which cannot be guaranteed secured. This study executed face-to-face in-depth interviews with the frontline businesses in order to gather live opinions and to analyze industry's value chain, problems, and difficulties with a view to defining policy tasks for the development of the industry. The findings of the study revealed the current technical level of the information security industry, the frontline difficulty, and industrial ecosystem status. Based on these findings, the industry revitalization policy was devised and proposed. Objectives of the policy included the fostering of capacity to conceptualize, plan, and design industrial strategies based on the analysis of the industry's value chain and ecosystem, the expansion of the industry's value-added through the enhanced securing and management of the Intellectual Property Rights (IPR), and the nurturing of the security Human Resources (HR) in line with the industrial demand.