• Title/Summary/Keyword: Private- and Public-key

Search Result 355, Processing Time 0.025 seconds

DEVELOPMENT OF A VALLEY MANAGEMENT SYSTEM FOR GIS AND REMOTE SENSING EDUCATION

  • Wu, Mu-Lin;Wong, Deng-Ching;Wang, Yu-Ming
    • Proceedings of the KSRS Conference
    • /
    • v.2
    • /
    • pp.570-573
    • /
    • 2006
  • College GIS and remote sensing education usually consists of commercial software packages implementations in the classroom. Computer programming is quite important when college graduates work in private or public sectors relevant with GIS and remote sensing implementations. The objective of this paper was to develop a valley management system which implements GIS and remote sensing as the key components for education. The Valley Authority is entitled with water resource protection for sustainable drinking water supply of the second largest city in Taiwan. The test area consists of three different government agencies, Forest Service, EPA, and Water Resource Agency. Materials were provided by the Valley Authority in ArcGIS file format. MapObjects have made the GIS development process much easier. Remote sensing with image manipulation functions were provided by computer programming with Visual Baisc.NET and Visual C#.NET. Attributes inquiry are performed by these two computer languages as well. ArcGIS and ArcPad are also used for simple GIS manipulations of the test area. Comparison between DIY and commercial GIS can be made by college students. Functions provided by the developed valley management system depending on how many map layers have been used and what types of MapObjects components have been used. Computer programming experience is not essential but can be helpful for a college student. The whole process is a step-by-step sequence which college students can modify to depict their capability in GIS and remote sensing. The development process has gone through one semester, three hours every week in 18 weeks. College students enrolled in this class entitled with GIS showed remarkable progresses both in GIS and remote sensing.

  • PDF

An Exploratory Study on the Relationship between Decision Making Styles and Risk Attitudes : The Case of Korean Adults (의사결정스타일과 위험성향의 측정, 분포, 그리고 그 관계 : 한국인 표본을 대상으로)

  • Bae, Eunsung;Kim, Bumseok;Min, Jae H.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.41 no.4
    • /
    • pp.33-53
    • /
    • 2016
  • We measure individuals' decision making styles and risk attitudes from a sample of Korean adults using the general decision making styles (GDMS) and the multiple price list design (MPLD), respectively. With the measurement results, we identify the distributions of the decision making styles and risk attitudes, and explore the relationship between them. Specifically, we conduct an exploratory experiment to find out some meaningful characteristics of the Korean adults in terms of their decision making styles and risk attitudes. The results of the experiment show that the distribution of the five decision making styles turns out to be different by the demographic characteristics of the sample. In addition, risk attitudes of the Korean people are quite distinct from those shown in the previous studies which were mostly conducted in the United States with the samples of college students. It is also shown that each of the five decision making styles has a different distribution of risk attitudes, which is statistically verified. The results of this study make a meaningful addition to the literature of this kind by providing the rationale for understanding the decision making styles and the risk attitudes of the Korean adults, which may serve as grounds for predicting the behaviors of the key individuals in various public and private sectors.

An Experimental Study on the Design of Digital Media Systems using Hue and Color Contrast (색조와 색상차를 이용한 디지털 미디어 시스템의 설계 방안에 대한 실험적 연구)

  • Kim, Jin-Woo;Jeon, Seok-Won;Lee, Su-Jin
    • Information Systems Review
    • /
    • v.9 no.3
    • /
    • pp.133-156
    • /
    • 2007
  • The wide spread of the Internet and personal computers does not only alter the form of content from analog to digital, but also lead to the emergence of a new digital media system that is different from analog media system. The digital media system is a convergent media that includes both public and private systems from the perspective of use-limitation, as well as storage and enjoyment systems from the perspective of use-purpose. The major goal of this research is to suggest and empirically verify an effective way of presenting the perception of places that are converged in the digital media system. Involvement and motivation are suggested as key conceptual factors and color contrast and hue are suggested as concrete design factors to make people perceive corresponding places. Results of our controlled experiment indicated that the color contrast and hue significantly affected the perception of place, and consequently, influenced usability of the digital media system. This paper ends with implications that can be used to construct appropriate perception of places for the media system of digital products.

A Study on the Definition and Measure Development for EA Functions (전사 아키텍처(EA)의 기능 정의 및 측정지표에 관한 실증적 연구)

  • Jeon, Seung-Ryul;Kang, Jae-Hwa;Lee, Bong-Gyou
    • The KIPS Transactions:PartD
    • /
    • v.17D no.1
    • /
    • pp.77-86
    • /
    • 2010
  • Recently, Enterprise Architecture (EA) has emerged as the important keyword in both private and public sectors. With this phenomenon, there are tremendous need for the measures of EA functions, one of the key EA research variables, to provide academic insights and accumulate research findings in this area. Thus far, multiple definitions and concepts for EA functions exist, causing confusion among observers. Thus, in order to clarify the conceptual meaning behind the term "functions of EA" once and for all, this study reviews previous literature and provides conceptual definition. Then, we identify 24 items and rigorously develop and validate the measurement instrument for EA functions, which results in five domains: Infrastructure Systemization, Integration Management, IT Governance Support, Development and Operation Management, and Investment Management.

Implementation of user authentication and access control system using x.509 v3 certificate in Home network system (홈 네트워크 시스템에서 x.509 v3 인증서를 이용한 사용자 인증 및 접근제어 시스템의 구현)

  • Lee, Kwang-Hyoung;Lee, Young-Gu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.920-925
    • /
    • 2010
  • A home network system is made up of home devices and wire and wireless network can not only be the subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. As a result, a variety of problems such as abuse of private life, and exposure and stealing of personal information arose. Therefore, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this dissertation designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

A Study on Obstacles and Promotion of Faculty Technology Entrepreneurship (교수 기술창업 장애요인 및 활성화 방안에 관한 연구)

  • Park, Keon Chul;Lee, Chi Hyung
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.81-88
    • /
    • 2019
  • This study suggests the ways to promote the technology startups founded by professor, who differs from student or researcher in social status, risk-taking tendency, and motivation. Literatures were reviewed to understand the advantage of faculty's tech start-up, foreign cases, and related researches. In addition, key stakeholders were interviewed. The study shows that domestic faculty entrepreneurship is currently in infant stage while facing obstacles in institutional, financial and practical aspects. In order to promote faculty entrepreneurship, the study suggests that university and professor set up the benefit sharing structure in advance, that the public sector establishes a holding company or investment fund dedicated to support a faculty startup, that proactive effort be made to attract passive professors to the startup world, and that private companies join faculty startups in the process of concept proofing and product commercialization. The study is expected to provide government, university, and industry with practical implication in promoting faculty startup.

Issues and Perception on Management Fee and Rental Payment Overdue of Permanent Rental Housing Residents (영구임대주택 입주자의 관리비 및 임대료 체납 실태와 의식)

  • Kim,, Young-Joo;Kim, Young-Tae
    • Journal of the Korean housing association
    • /
    • v.18 no.5
    • /
    • pp.73-84
    • /
    • 2007
  • Permanent rental housing, the construction of which was strongly financed by the central government, is regarded as a social housing for those who fall within the lowest income bracket. Differing from "public rental housing", offered to tenants for sale after a five year rental period, this type of housing is intended for rental use on a long-tenn basis. At present, about 190,000 permanent rental housing units exist in Korea. According to a statistics, 15.6% of its residents did not pay their management fee and rental payment in 4 or more months in 2005, which places stress on the housing management. Based on the "eviction condition" stipulated in the tenancy agreement for permanent rental housing, a householder owning assets or a vehicle which is not used as his means of living, who is overdue with his management fee and rental payment for a long time, may be evicted from the house. However, there are many conflicts and problems between administrators/housing managers and residents in the process of enforcing this regulation. The purpose of this study is to explore the key issues associated with the present situation and the reasons why so many management fee and rental payment for permanent rental housing are overdue. For the purpose of research, data were collected from 10,990 permanent rental housing residents nationwide via a questionnaire survey in February 2007. One third of the respondents had an experience of more than 2 months overdue since they have moved in current residence. For further analysis, the respondents were divided into three groups, based on their working ability. The major finding showed that the group of respondents who have working ability required a more practical plan, such as employment, to have a sustainable life, while the other group of no labor force indicated a need for more housing allowance from the government. To suggest more specific alternatives for the subject of housing payment overdue, further comparison study should be performed between the residents of permanent rental housing and other low income tenants in private housing sector.

A Study on the Transaction Security of Electronic Payment (전자결제의 보안성에 관한 연구)

  • 홍선의
    • The Journal of Information Technology
    • /
    • v.1 no.1
    • /
    • pp.173-188
    • /
    • 1998
  • In this paper we discussed various types of electronic payment schemes that are emerging. Threats vary from malicious hackers attempting to crash a system, to threats to data or transaction integrity. An understanding of the various types of threats can assist a security manager in selecting appropriate cost-effective controls to protect valuable information resources. An overview of many of today's common threats presented in this paper will be useful to mangers studying their own threat environments with a view toward developing solutions specific to their organization. To ensure security on the Internet, several methods have been developed and deployed. They include authentication of users and servers, encryption, and data integrity. Transaction security is critical : without it, information transmitted over the Internet is susceptible to fraud and other misuse. So computer systems represents an Intermediary with the potential to access the flow of information between a user. Security is needed to ensure that intermediaries cannot eavesdrop on transactions, or copy/modify data. Online firms must take additional precautions to prevent security breaches. To protect consumer information, they must maintain physical security of their servers and control access to software passwords and private keys. Techniques such as secret and public-key encryption and digital signatures play a crucial role in developing consumer confidence in electronic commerce.

  • PDF

A Study on Actual Conditions of Industrial Safety Regulations - Based on Petrochemical Plant - (산업현장에서의 안전규제 적용실태 연구 - 석유화학공장을 중심으로 -)

  • Oh, Hyeong-Geun;Baek, Dong-Seung
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.11 no.2
    • /
    • pp.81-86
    • /
    • 2011
  • Without a special mineral resources in Korea, such as petrochemical industries, electronics and automotive industries to supply the basic material, but remains a key industry locations. Gongjeongsang dealing with hazardous materials, such as a fire or explosion hazard, and from this site sangjonhae safety regulations to protect human and material disaster prevention activities are focused. However, depending on the actual implementation of standardized safety regulations as necessary if not originally intended, proper objectivity and reliability of safety regulations, as well as impaired resulting in a waste of public and private administrative power and petrochemical industries and the competitiveness of the entire drop factor will. Accordingly, this study petrochemical plant is applied to a representative safety regulations, items for their safety are needed and these regulations as being implemented that was identified, according to a study, some of the need for regulation and implementation both in terms of reliability was low.

Military Application of Two-factor Authentication to Data Leakage and Access Prevention (데이터 유출 및 접근방지를 위한 이중 인증방식의 군(軍) 적용방안)

  • Jung, Ui Seob;Kim, Jee Won;Kim, Jae Hyun;Jeong, Chan ki
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.21-27
    • /
    • 2018
  • Most of the Internet users in Korea are issued certificates and use them for various tasks. For this reason, it is recommended that accredited certification authorities and security related companies and use public certificates on USB memory and portable storage devices rather than on the user's desktop. Despite these efforts, the hacking of the certificate has been continuously occurring and the financial damage has been continuing. Also, for security reasons, our military has disabled USB to general military users. Therefore, this study proposes a two-factor method using the unique information of the USB memory and the PC which is owned by the user, and suggests a method of managing the private key file secure to the general user. Furthermore, it will be applied to national defense to contribute to the prevention of important data and prevention of access by unauthorized persons.

  • PDF