• Title/Summary/Keyword: Security Concepts

Search Result 262, Processing Time 0.024 seconds

Construction of a Digitally Represented Person by Personal Data: A Multidimensional Framework from an Inforg Perspective

  • Jinyoung Min;HanByeol Stella Choi;Chanhee Kwak;Junyeong Lee
    • Asia pacific journal of information systems
    • /
    • v.34 no.1
    • /
    • pp.292-320
    • /
    • 2024
  • The amount of data a related to a person is so substantial that it appears that a digital version of them can be built thereon. They are usually handled as personal information, and the attempts made to understand personal information have led to bundling and unbundling of various data, yielding numerous fragmented categories of personal information. Therefore, we attempt to construct a generalizable lens for a deeper understanding of person-related data. We develop a theoretical framework that provides a fundamental method to understand these data as an entity of a digitally represented person based on literature review as well as the concepts of inforg and infosphere. The proposed framework suggests person-related data consist of three informational inforg dimensions that can preserve the archetype of a person, form, content, and interaction. Subsequently, the framework is examined and tested through several analyses in two different contexts: social media and online shopping mall. This framework demonstrates the suggested dimensions are interrelated with certain patterns, the prominent dimension can determine the data characteristics, and the dimensional composition of data types can imply the characteristics of the digitally represented person in certain contexts.

Exploring the Practical Value of Business Games: Analysis with Toulmin's Sensemaking Framework

  • Joo Baek Kim;Edward Watson;Soo Il Shin
    • Asia pacific journal of information systems
    • /
    • v.32 no.4
    • /
    • pp.803-829
    • /
    • 2022
  • With the advances in technology and the trend towards increased computer-based experiential learning in education settings, business games are being increasingly used by business educators. This article utilizes Toulmin's Sensemaking Framework to investigate the sensemaking process of business professionals to reveal how they consciously reason about the value of business games for learning complex business concepts and principles. Using the analysis of responses from 43 business professionals, our study identifies key areas where business professionals find value in business games and the limitations of using business games. First, business games are found to be an effective tool when teaching practical business skill sets to business professionals. Second, business games enhance the overall learning process in professional business training. Third, despite the advantages, some pitfalls in applying business games to practice are found. We also found sub-themes, claims, and argument patterns of how business professionals evaluate the value of business games through a grounded theory qualitative analysis method. Analysis results show several ground-warrant patterns exist in the arguments on values of business games including general principle - causal reasoning, personal experience - generalization, and personal projection - generalization. With these findings, we believe this paper contributes to the theory and practice of business game design, development, and the game playing and learning process.

A Case Study of Profit Optimization System Integration with Enhanced Security (관리보안이 강화된 수익성 최적화 시스템구축 사례연구)

  • Kim, Hyoung-Tae;Yoon, Ki-Chang;Yu, Seung-Hun
    • Journal of Distribution Science
    • /
    • v.13 no.11
    • /
    • pp.123-130
    • /
    • 2015
  • Purpose - Due to highly elevated levels of competition, many companies today have to face the problem of decreasing profits even when their actual sales volume is increasing. This is a common phenomenon that is seen occurring among companies that focus heavily on quantitative growth rather than qualitative growth. These two aspects of growth should be well balanced for a company to create a sustainable business model. For supply chain management (SCM) planners, the optimized, quantified flow of resources used to be of major interest for decades. However, this trend is rapidly changing so that managers can put the appropriate balance between sales volume and sales quality, which can be evaluated from the profit margin. Profit optimization is a methodology for companies to use to achieve solutions focused more on profitability than sales volume. In this study, we attempt to provide executional insight for companies considering implementation of the profit optimization system to enhance their business profitability. Research design, data, and methodology - In this study, we present a comprehensive explanation of the subject of profit optimization, including the fundamental concepts, the most common profit optimization logic algorithm -linear programming -the business functional scope of the profit optimization system, major key success factors for implementing the profit optimization system at a business organization, and weekly level detailed business processes to actively manage effective system performance in achieving the goals of the system. Additionally, for the purpose of providing more realistic and practical information, we carefully investigate a profit optimization system implementation case study project fulfilled for company S. The project duration was about eight months, with four full-time system development consultants deployed for the period. To guarantee the project's success, the organization adopted a proven system implementation methodology, supply chain management (SCM) six-sigma. SCM six-sigma was originally developed by a group of talented consultants within Samsung SDS through focused efforts and investment in synthesizing SCM and six-sigma to improve and innovate their SCM operations across the entire Samsung Organization. Results - Profit optimization can enable a company to create sales and production plans focused on more profitable products and customers, resulting in sustainable growth. In this study, we explain the concept of profit optimization and prerequisites for successful implementation of the system. Furthermore, the efficient way of system security administration, one of the hottest topics today, is also addressed. Conclusion - This case study can benefit numerous companies that are eagerly searching for ways to break-through current profitability levels. We cannot guarantee that the decision to deploy the profit optimization system will bring success, but we can guarantee that with the help of our study, companies trying to implement profit optimization systems can minimize various possible risks across various system implementation phases. The actual system implementation case of the profit optimization project at company S introduced here can provide valuable lessons for both business organizations and research communities.

Research Trend Analysis Using Bibliographic Information and Citations of Cloud Computing Articles: Application of Social Network Analysis (클라우드 컴퓨팅 관련 논문의 서지정보 및 인용정보를 활용한 연구 동향 분석: 사회 네트워크 분석의 활용)

  • Kim, Dongsung;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.195-211
    • /
    • 2014
  • Cloud computing services provide IT resources as services on demand. This is considered a key concept, which will lead a shift from an ownership-based paradigm to a new pay-for-use paradigm, which can reduce the fixed cost for IT resources, and improve flexibility and scalability. As IT services, cloud services have evolved from early similar computing concepts such as network computing, utility computing, server-based computing, and grid computing. So research into cloud computing is highly related to and combined with various relevant computing research areas. To seek promising research issues and topics in cloud computing, it is necessary to understand the research trends in cloud computing more comprehensively. In this study, we collect bibliographic information and citation information for cloud computing related research papers published in major international journals from 1994 to 2012, and analyzes macroscopic trends and network changes to citation relationships among papers and the co-occurrence relationships of key words by utilizing social network analysis measures. Through the analysis, we can identify the relationships and connections among research topics in cloud computing related areas, and highlight new potential research topics. In addition, we visualize dynamic changes of research topics relating to cloud computing using a proposed cloud computing "research trend map." A research trend map visualizes positions of research topics in two-dimensional space. Frequencies of key words (X-axis) and the rates of increase in the degree centrality of key words (Y-axis) are used as the two dimensions of the research trend map. Based on the values of the two dimensions, the two dimensional space of a research map is divided into four areas: maturation, growth, promising, and decline. An area with high keyword frequency, but low rates of increase of degree centrality is defined as a mature technology area; the area where both keyword frequency and the increase rate of degree centrality are high is defined as a growth technology area; the area where the keyword frequency is low, but the rate of increase in the degree centrality is high is defined as a promising technology area; and the area where both keyword frequency and the rate of degree centrality are low is defined as a declining technology area. Based on this method, cloud computing research trend maps make it possible to easily grasp the main research trends in cloud computing, and to explain the evolution of research topics. According to the results of an analysis of citation relationships, research papers on security, distributed processing, and optical networking for cloud computing are on the top based on the page-rank measure. From the analysis of key words in research papers, cloud computing and grid computing showed high centrality in 2009, and key words dealing with main elemental technologies such as data outsourcing, error detection methods, and infrastructure construction showed high centrality in 2010~2011. In 2012, security, virtualization, and resource management showed high centrality. Moreover, it was found that the interest in the technical issues of cloud computing increases gradually. From annual cloud computing research trend maps, it was verified that security is located in the promising area, virtualization has moved from the promising area to the growth area, and grid computing and distributed system has moved to the declining area. The study results indicate that distributed systems and grid computing received a lot of attention as similar computing paradigms in the early stage of cloud computing research. The early stage of cloud computing was a period focused on understanding and investigating cloud computing as an emergent technology, linking to relevant established computing concepts. After the early stage, security and virtualization technologies became main issues in cloud computing, which is reflected in the movement of security and virtualization technologies from the promising area to the growth area in the cloud computing research trend maps. Moreover, this study revealed that current research in cloud computing has rapidly transferred from a focus on technical issues to for a focus on application issues, such as SLAs (Service Level Agreements).

Current Status and Tasks of Maritime Territorial Policies in Korea (국내 해양영토 정책의 현황과 과제)

  • Lee, Junsung
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.237-255
    • /
    • 2021
  • This article analyzed maritime territorial policies in Korea. Marine territory originally refers to the topography of the subsoil in a country's territorial sea. From a political perspective, it is a broad concept that includes islands and polar regions beyond the jurisdiction of Korean sovereignty or sovereign rights, such as territorial waters, EEZs, and continental shelves. Also, Korean researchers use "maritime territory" as a term for maritime zones that stretch from Ieodo (Korean EEZ) to Dokdo Island. The purpose of this study is to review the concepts of various domestic maritime territories and examine the formation and change of policies. The article is structured as follows. Chapter 2 reviews past discussions on maritime territories and analyzes the concept of maritime territory based on them. The term "maritime territory" is used indiscriminately with islands due to the lack of discussion on this matter between academic circles in the past. Therefore, this chapter provides an in-depth analysis of the concept of maritime territory. Chapter 3 tracks the formation and change of maritime territorial policies. Today, the concept of domestic maritime territory has been completed in the public domain. The activities of the Ministry of Oceans and Fisheries, the control tower of domestic maritime territorial policies, are summarized to explain this concept. Chapter 4 analyzes the concept of maritime territory by comparing it with China's blue state territory (藍色國土). As China's concept of blue state territory has many similarities with maritime territory as a political base for China's maritime activities today, comparing these two concepts would be significant. Based on the above, Chapter 5 derives suggestions to promote maritime territorial policies.

  • PDF

The Construction and Characters of the Welfare Rights (복지권의 구성과 성격)

  • Ahn, Chi-Min
    • Korean Journal of Social Welfare
    • /
    • v.55
    • /
    • pp.5-25
    • /
    • 2003
  • This study analysed the components and characters of welfare rights through discussions of the concepts and types of universal rights, and discussions of human rights and citizenship rights. Welfare rights is claims rights which requires somewhat, and it is positive rights. And it is generally passive rights, but it contains collective participation rights which is active rights. The result of total discussions of rights, human rights, and citizenship rights led us to know the components and characters of welfare rights. Welfare rights contains social rights, economic rights, and cultural environmental rights. Social rights are composed of the right of social security, social welfare service, health, education, and residency. Economic rights are composed of the right of labor, intervension of labor market, job security, and capital control. cultural environmental rights are composed of the right of culture and environment. And welfare rights has several characters. First, it is natural rights which is bestowed on the citizens or people in modern civil societies. it is samely characterised as liberties and political rights. second, it has the same values like other rights such as lberties and political rights. Or it is more important, because it is necessary for other rights. Third, it is not the objective being which is constant, but it is changed, formed and constructed as total rights with human rights and citizenship rights. Fourth, it is truely rights, but is simultaniously accompanied by obligations. But the obligations is unconditional like as other rights. Endly, levels of welfare on the welfare rights must be modicum rather than minimum. The meaning of modicum level is uncertain, but it aims to the entire participation of peoples as citizen and social integration. And it has to aim to the prevention of heridity and continuity of inequality.

  • PDF

The Proposition of Domestic Sprinklers Installation Standard and the Fire Services Act (국내 스프링클러 설치기준과 소방관련 법에 관한 고찰)

  • Kim, Yong-Moon;Lee, Young-Jai
    • Journal of Korean Society of Disaster and Security
    • /
    • v.7 no.2
    • /
    • pp.17-24
    • /
    • 2014
  • Recently, many accidents occur frequently because sprinklers aren't installed or don't work right when there are outbreak of fire in houses and aggregate buildings. Therefore, they can result in damage for humans and loss of property. Sprinklers are the most appropriate which can extinguish buildings' fire in the initial stages. Through lack of legal system, in domestic cases, sprinklers cannot operate their inherent performance. Domestic standard simply classifies installation objects according to types of business and forms of buildings, also divides into uses and floors of buildings. Especially it only regulates that sprinklers must be installed every floors in particular fire buildings that have more than eleven floors. While it doesn't need to install sprinklers below ten floors, so we are threatened the safety. In this study, we derived causes and implications by analyzing concepts of sprinklers facilities, installation standards in domestic and foreign legal system, and recent cases that expanded damages in fire accidents because of weak point of installation and control standards. In domestic cases, as a result, government has to provide an institutional strategy and law that regulate duty to install sprinklers to all aggregate buildings regardless of floors in terms of new buildings. Also, if someone who has existing buildings wanted to install them, government would guarantee subsidy to encourage installation. In addition, government supervises fire-fighting activities when there are fire by compensating standards about regular inspection by a qualified technician, operation and maintenance of sprinklers as well as reinforcement of administrative criteria.

Deterrent Strategy in the era of North Korea's WMD and Missile Threats : Challenges and the Ways to go (북 핵·미사일 시대의 억제전략 : 도전과 나아갈 방향)

  • Lee, Sang-Yup
    • Strategy21
    • /
    • s.41
    • /
    • pp.232-260
    • /
    • 2017
  • The purpose of this paper is to open a debate about what kind of deterrent strategy the ROK military should pursue in the era of NK's weapons of mass destruction and missile threats. I argue that the ROK military needs a comprehensive deterrent strategy that reflects the international security situations and trends and that builds on clear understanding of the basic concepts and how deterrence operates. The paper starts with surveying the basic knowledge of deterrence from the perspectives of both theory and practice. Then, it provides explanations on why deterrence against NK can be particularly difficult given the security environment in and around the Korean peninsula. For example, South Korea and North Korea hardly share 'common knowledge' that serves as a basic element for the operation of deterrence. Deterrence against North Korea involves complex situations in that both deterrence and compellence strategies may be relevant particularly to North Korea's WMD and missile threats. It also involves both immediate and general deterrence. Based on the discussion, I suggest several ideas that may serve as guidelines for establishing a deterrent strategy against NK. First, our threats for deterrence should be the ones that can be realized, particularly in terms of the international norms. In other words, they must be considered appropriate among other nations in the international community. Second, there should be separate plans for the different kinds of threats: one is conventional, local provocations and the other is WMD/missile related provocations. Third, we should pursue much closer cooperative relations with the U.S. military to enhance the effectiveness of immediate deterrence in the Korean peninsula. Fourth, the ROK military should aim to accomplish 'smart deterrence' maximizing the benefits of technological superiority. Fifth, the ROK military readiness and structure should be able to deny emerging North Korean military threats such as the submarine-launched ballistic missiles and intercontinental ballistic missiles. Lastly, in executing threats, we should consider that the current action influences credibility and reputation of the ROK, which in turn affect the decisions for future provocations. North Korea's WMD/missile threats may soon become critical strategic-level threats to South Korea. In retrospect, the first debate on building a missile defense system in South Korea dates back to the 1980s. Mostly the debate has centered on whether or not South Korea's system should be integrated into the U.S. missile defense system. In the meantime, North Korea has become a small nuclear power that can threaten the United States with the ballistic missiles capability. If North Korea completes the SLBM program and loads the missiles on a submarine with improved underwater operation capability, then, South Korea may have to face the reality of power politics demonstrated by Thucydides through the Athenians: "The strong do what they have the power to do, the weak accept what they have to accept."

Direction of Development of Reaction to Bio-terrorism (생물테러리즘 대응을 위한 기술적 측면의 발전방향)

  • Lee, Kwang-Iyeol;Kim, Chang-Ho
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.311-336
    • /
    • 2007
  • This study examines the concepts of counter-act against the Bio-terrorism and the reaction system in advanced countries, thereby to find out reaction system necessary to Korea. Acts on anti-Bio-terrorism is divided to detection stage, protection stage, diagnosis stage and detoxication and neutralization stage according to flow of event occurrence. As for detection stage, Korea is developing it as contact type, while advanced countries are under development of the devices that may detect the terrorism from the remote distance. It is necessary for Korea to develop the remote-distant detection system as well as the contact type of device that may promptly operate. Among the protection gears, the quality of Korea's gas mask is recognized worldwide, but that of other outfits should be improved by applying the state-of-art science technology. The diagnosis device also should be developed to the extent that the dispatched initial action team may make immediate decisions necessary in the field. As the current trends for detoxication materials worldwide require the improvement to new materials harmless to human body and equipment, Korea is also required to acquire those materials. The technology for neutralization means the development of vaccine and antibiotics and it requires the development made by shared efforts worldwide. For this purpose, it is necessary to further develop Korea's medical technology. In addition, the further efforts are required in terms of reaction manual, training model, public communication efforts and preparation for trauma syndrome.

  • PDF

Performance Analysis of Matching Cost Functions of Stereo Matching Algorithm for Making 3D Contents (3D 콘텐츠 생성에서의 스테레오 매칭 알고리즘에 대한 매칭 비용 함수 성능 분석)

  • Hong, Gwang-Soo;Jeong, Yeon-Kyu;Kim, Byung-Gyu
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.9-15
    • /
    • 2013
  • Calculating of matching cost is an important for efficient stereo matching. To investigate the performance of matching process, the concepts of the existing methods are introduced. Also we analyze the performance and merits of them. The simplest matching costs assume constant intensities at matching image locations. We consider matching cost functions which can be distinguished between pixel-based and window-based approaches. The Pixel-based approach includes absolute differences (AD) and sampling-intensitive absolute differences (BT). The window-based approach includes the sum of the absolute differences, the sum of squared differences, the normalized cross-correlation, zero-mean normalized cross-correlation, census transform, and the absolute differences census transform (AD-Census). We evaluate matching cost functions in terms of accuracy and time complexity. In terms of the accuracy, AD-Census method shows the lowest matching error ratio (the best solution). The ZNCC method shows the lowest matching error ratio in non-occlusion and all evaluation part. But it performs high matching error ratio at the discontinuities evaluation part due to blurring effect in the boundary. The pixel-based AD method shows a low complexity in terms of time complexity.