The Journal of the Institute of Internet, Broadcasting and Communication
/
v.19
no.2
/
pp.25-40
/
2019
Many companies are executing big data analysis and utilization projects to legitimize the development of new business areas or conversion of management or technical strategies. In Korea and abroad, however, such projects are failing because they are not completed within specified deadlines, which is not unrelated to the current situation in which the knowledge base for big data project risk management from an engineering perspective is grossly lacking. As such, the current study analyzes the risk factors of big data implementation and utilization projects, in addition to finding risk factors that are highly important. To achieve this end, the study extracts project risk factors via literature review, after which they are grouped using affinity methodology and sifted through expert surveys. The deduced risk factors are structuralize using factor analysis to develop a table that categorizes various types of big data project risk factors. The current study is significant that in it provides a basis for developing basic control indicators related to risk identification, risk assessment, and risk analysis. The findings from the study contribute greatly to the success of big data projects, by providing theoretical basis regarding efficient big data project risk management.
This study is to suggest improvements of personal information protection in South Korea, according to requiring the safety of process and protection of personal information. Accordingly, based on data collection and analysis through literature research, this study derived the issues and suitable standards of personal information for major artificial intelligence services. In addition, this cases studies were reviewed, focusing on the legal compliance and porcessing compliance for personal information proection in major countries. And it suggested the improvement plan applied in South Korea. As the results, in legal compliance, it is required reorganization of related laws, responsibility and compliance to develop and provide AI, and operation of risk management for personal information protection laws in AI services. In terms of processing compliance, first, in pre-processing and refining, it is necessary to standardize data set reference models, control data set quality, and voluntarily label AI applications. Second, in development and utilization of algorithm, it is need to establish and apply a clear regulation of the algorithm. As such, South Korea should apply suitable improvement tasks for personal information protection of safe AI service.
The cyber battlefield called the fifth battlefield, is not based on geological information unlike the existing traditional battlefiels in the land, sea, air and space, and has a characteristics that all information has tightly coupled correlation to be anlayized. Because the cyber battlefield has created by the network connection of computers located on the physical battlefield, it is not completely seperated from the geolocational information but it has dependency on network topology and software's vulnerabilities. Therefore, the analysis for cyber battlefield should be provided in a form that can recognize information from multiple domains at a glance, rather than a single geographical or logical aspect. In this paper, we describe a study on the development of the cyber operation COP(Common Operational Picture), which is essential for command and control in the cyber warfare. In particular, we propose an architecure for cyber operation COP to intuitively display information based on visualization techniques applying the multi-layering concept from multiple domains that need to be correlated such as cyber assets, threats, and missions. With this proposed cyber operation COP with multi-layered visualization that helps to describe correlated information among cyber factors, we expect the commanders actually perfcrm cyber command and control in the very complex and unclear cyber battlefield.
Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.
Jeong-Min, Lee;Won-Gi, Lim;Won-Jun, Cho;Yong-Cheol, Kim;Jeung-Sub, Lee
Journal of the Korea Society of Computer and Information
/
v.28
no.3
/
pp.45-58
/
2023
KVMF(Korean Variable Message Format) 1.0 protocol is the Army's standard tactical datalink protocol that defines standard messages and communication methods to enable data communication between various weapon systems through bitwise variable message processing. The protocol has been applied to a variety of Army weapon systems over the past decade and has contributed to upgrade the Army's operational capabilities by enabling the implementation of Network Centric Warfare (NCW), the core of modern warfare. Since the KVMF 1.0 protocol was applied, new weapon systems with new technologies have been introduced over time, and new weapon systems have new messages based on the characteristics of the weapon system. As a result, compatibility problems arose due to different message versions with existing weapon systems, and it was expected that these problems would continue to emerge in the future, considering the need for continuous message revisions. Therefore, it became necessary to solve this problem, so this paper proposed a KVMF 2.0 protocol design that guarantees compatibility between forward and backward versions. In this paper, we implemented the design as SW, and confirmed that the design worked successfully by test between forward and backward versions on test environment. Therefore, when the KVMF 2.0 protocol design is applied to a weapon system, we can expect that the weapon system can be compatible with the forward and backward versions working with the existing weapon systems as well as with the future weapon systems.
The Yeonghae basin is located at the northeastern part of the Yangsan fault (YSF; a potentially active fault). The study of the architecture of the Yeonghae basin is important to understand the activity of the Yangsan fault system (YSFS) as well as the basin formation mechanism and the activity of the YSFS. For this study, Digital Elevation Model (DEM) was used to highlight the marginal faults, and structural fieldwork was performed to understand the geometry of the intra-basinal structures and the nature of the bounding faults. DEM analysis reveals that the eastern margin is bounded by the northern extension of the YSF whereas the western margin is bounded by two curvilinear sub-parallel faults; Baekseokri fault (BSF) and Gakri fault (GF). The field data indicate that the YSF is striking in the N-S direction, steeply dipping to the east, and experienced both sinistral and dextral strike-slip movements. Both the BSF and GF are characterized dominantly by an oblique right-lateral strike-slip movement. The stress indicators show that the maximum horizontal compressional stress was in NNE to NE and NNW-SSE, which is consistent with right-lateral and left-lateral movements of the YSFS, respectively. The plotted structural data show that the NE-SW is the predominant direction of the structural elements. This indicates that the basin and marginal faults are mainly controlled by the right-lateral strike-slip movements of the YSFS. Based on the structural architecture of the Yeonghae basin, the study area represents a contractional zone rather than an extensional zone in the present time. We proposed two models to explain the opening and developing mechanism of the Yeonghae basin. The first model is that the basin developed as an extensional pull-apart basin during the left-lateral movement of the YSF, which has been reactivated by tectonic inversion. In the second model, the basin was developed as an extensional zone at a dilational quadrant of an old tip zone of the northern segment of the YSF during the right-lateral movement stage. Later on, the basin has undergone a shortening stage due to the closing of the East Sea. The second model is supported by the major trend of the collected structural data, indicating predominant right-lateral movement. This study enables us to classify the Yeonghae basin as an inverted strike-slip basin. Moreover, two opposite strike-slip movement senses along the eastern marginal fault indicate multiple deformation stages along the Yangsan fault system developed along the eastern margin of the Korean peninsula.
Journal of The Korean Association of Information Education
/
v.26
no.5
/
pp.341-352
/
2022
The wave of a knowledge and information society led by AI, Big Data, and so on is having an all-round impact on our way of life. Therefore the Ministry of Education is in a hurry to strengthen Digital Literacy, including AI and SW Education, by improving the curriculum that can cultivate basic knowledge and capabilities to respond to changes in the future society. It can be seen that establishing a foundation for cultivating Digital Literacy through all subjects and improving basic and in-depth learning in new technology fields such as AI linked to the information curriculum is an essential part for future society. However, research on each content for cultivating Digital and AI literacy is relatively active, while research on teaching and learning strategies is insufficient. Therefore in this study, a CT-based Digital and AI teaching and learning strategy that can foster that was developed and Delphi expert verification was conducted, and the final teaching and learning strategy was completed after evaluating instructor usability and analyzing learner effectiveness.
This study aims to investigate the online class preference depending on students' gender and school level. To achieve this aim, the study conducted a survey on 4,803 elementary, middle, and high school students in 17 regions nationwide. The valid data of 4,524 were then analyzed using the Apriori algorithm to discern the associated patterns of the online class preference corresponding to their gender and school level. As a result, a total of 16 rules, including 7 from elementary school students, 4 from middle school students, and 5 from high school students were derived. To be specific, elementary school male students preferred software-based classes whereas elementary female students preferred maker-based classes. In the case of middle school, both male and female students preferred virtual experience-based classes. On the other hand, high school students had a higher preference for subject-specific lecture-based classes. The study findings can serve as empirical evidence for explaining the needs of online classes perceived by K-12 students. In addition, this study can be used as basic research to present and suggest areas of improvement for diversifying online classes. Future studies can further conduct in-depth analysis on the development of various online class activities and models, the design of online class platforms, and the female students' career motivation in the field of science and technology.
Chun Jong-Hwa;Cheong Daekyo;Han Sang-Joon;Huh Sik;Yoo Hai-Soo
Economic and Environmental Geology
/
v.39
no.1
s.176
/
pp.83-93
/
2006
The Kita-Yamato Trough is characterized by a SW-NE trending narrow graben between the Yamato Bank and the Kita-Yamato Bank in the central East Sea/Japan Sea (ES/JS). Core 20EEZ-1 was obtained in the flat summit of a small ridge from the southwest Kita-Yamato Trough. The sedimentation was mainly controlled by the supply of hemipelgic sediments and substantial tephras from explosive volcanic eruptions of the Quaternary volcanoes. The aim of this study is to reconstruct the tephrostratigraphy from the marine sediments collected from the Kita-Yamato Trough and to provide the atmosphere and ocean conditions during the explosive volcanic eruptions. According to the detailed tephrostratigraphy and lithofacies records, the core sediments were deposited during the last marine isotope stage (MIS) 7. The core consists of four lithofacies, idetified as, oxidized mud (OM), crudely laminated mud (CLM) and bioturbated mud (BM), interbedded with coarse-grained tephra (TP). The major element geochemistry and stratigraphic positions of seven tephra layers suggest that they originated from the Aira caldera in Kyushu area among the Japanese islands (AT tephra; 29.24 ka), unknown submarine volcano in the south Korea Plateau (SKP-I; MIS 3, SKP-II; MIS 4, SKP-IV; boundary between MIS 6 and MIS 5e, SKP-V; MIS 6, respectively), and the Baegdusan volcano in the Korean Peninsula (B-KY1; ca. 130 ka, B-KY2; ca. 196 ka). The absence of tephras originated trom Ulleung Island in core 20EEZ-l suggest that the tephras had not been transported into the Kita-Yamato Trough by atmosphere conditions during the eruptions. On the other hand, the B-KYI and the B-KY2 tephras derived from the Baegdusan volcano were founded in the Kita-Yamato Trough by a presence of prevailing westerly winds during the eruptions. Furthermore, the SKP tephras were characterized by the transport across the air-water interface, causing quickly thrust of raising eruption plumes from subaqueous explosive eruptions. Surface currents may play an important role in controlling the distribution patterns of the SKP tephras to distal areas. The tephrostratigraphic study in the Kita-Yamato Trough provides the important chronostratigraphic marker horizons and the detailed atmosphere and ocean conditions during the explosive eruptions.
Asia-Pacific Journal of Business Venturing and Entrepreneurship
/
v.14
no.2
/
pp.221-233
/
2019
In Korea, small and medium sized domestic enterprises(SMEs) play an pivotal role in the national economy, accounting for 99.9% of all enterprises, 87.9% of total employment, and 48.3% of production. and SMEs was driving a real force of the development of national economy in many respects such as innovation, job creation, industrial diversity, balanced regional development. Despite their crucial role in the national development, most of SMEs suffer from a lack of R&D capabilities and equipments as well as funding capacity. Public R&D institutes can provide SMEs with valuable supplementary technological knowledge and help them build technological capacity. so, In order to effectively support SMEs, government and public R&D institutes must be a priority to know about the factors influencing the performance related to technology transfer and technological collaborations. In particular, SMEs are not only taking up a large portion of the national economy, but also their influence in politics and economy so strong that raising the competitiveness of small and medium-sized companies is a national policy goal that must be achieved in order to achieve sustained economic growth. For this reason, it is necessary to look specifically at the relationship between concepts such as the environment, strategy, and organizational culture surrounding the enterprise to enhance the competitiveness of SMEs. The paper analyzes 665 companies to find out which organizational culture affects their performance by classification and type of business of SMEs. This study demonstrated that when SMEs seek consistency in their external environment, strategies, and organizational structure to maintain their continued competitiveness. According to three-way analysis of variance (3-way ANOVA) indicates that classification of industries in SMEs has statistically significant main effects, but the type of business and organizational culture do not have significant effects. However, the company's organizational performance (operating profit) of SMES were found to differ significantly in comparison between groups according to classification standards of industries, and therefore adopted some parts. In addition, an analysis of the effect of interaction between the three independent variables of small and medium-sized enterprises has shown that there are statistically significant interaction effects among classification, types of business, and organizational cultures. The results shows that there is an organizational culture suitable for each industry classification and type of business of an entity, and is expected to be used as a basis for establishing promotion policies related to the incubation and commerciality of small and medium-sized venture companies in the future.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.