• Title/Summary/Keyword: Security model

Search Result 3,932, Processing Time 0.033 seconds

An Analysis on the Evolutionary Characteristics of Ubiquitous City through Evolutionary Map of Ubiquitous City (유시티 진화 지도를 통한 유시티 진화 특성 분석)

  • JO, Sung-Soo;LEE, Sang-Ho;LEEM, Youn-Taik
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.2
    • /
    • pp.75-91
    • /
    • 2015
  • This study aims to analyse the U-City characteristics through the U-City historical mapping. The U-City characteristics were analysed by building the U-City historical map in terms of STIM model which consists of service, technology, infrastructure and management. The data for analysis is the National Informatization White Paper published by the NIA (National Information Society Agency) from 2002 to 2013. As a result, first, the U-City service were evolved from administration informatization, enterprise informatization, administration/living informatization and administration/space/private informatization through the intelligence facilities and space. Second, the U-City technology were changed through wire network, sensor/network, processing/super-highway network, convergence of network/security. Third, the U-City infrastructure have had evolutionary process such as wire computer network, wire/wireless network, intellectualization facility and intelligent facility space. Forth, the U-City management were carried out with making the unit network/infrastructure management, information connection/operating management and information integration/participation management. Therefore, the history of U-City has been making rapid development in government computerization, computer oriented society, information city and ubiquitous city.

A Study on Strengthening Consequence Management System Against CBRN Threats (CBRN 위협에 대비한 사후관리체계 강화방안)

  • Kwon, Hyuckshin;Kwak, Minsu;Kim, Kwanheon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.40 no.4
    • /
    • pp.429-435
    • /
    • 2020
  • North Korea declared itself complete with nuclear force after its sixth nuclear test in 2017. Despite efforts at home and abroad to denuclearize the Korean Peninsula, the prospects for the denuclearization are not bright. Along with political and diplomatic efforts to deter NK's WMD threats, the government is required to strengthen its consequence management capabilities against 'catastrophic situations' expected in case of emergency. Accordingly, this study was conducted to present measures to strengthen follow-up management against CBRN threats. The research model was partially supplemented and utilized by the THIRA process adopted and utilized by the U.S. Department of Homeland Security among national-level disaster management plan development models. Korea's consequence management (CM) system encompasses risk and crisis management on disaster condition. The system has been carried out in the form of a civil, government and military integrated defense operations for the purpose of curbing the spread or use of CBRNs, responding to threats, and minimizing expected damages. The preventive stage call for the incorporation of CBRN concept and CM procedures into the national management system, supplementing the integrated alarm systems, preparation of evacuation facilities, and establishment of the integrated training systems. In the preparation phase, readjustment of relevant laws and manuals, maintenance of government organizations, developing performance procedures, establishing the on-site support systems, and regular training are essential. In the response phase, normal operations of the medical support system for first aid and relief, installation and operation of facilities for decontamination, and development of regional damage assessment and control guidelines are important. In the recovery phase, development of stabilization evaluation criteria and procedures, securing and operation of resources needed for damage recovery, and strengthening of regional damage recovery capabilities linked to local defense forces, reserve forces and civil defense committees are required.

Determination of Weight Coefficients of Multiple Objective Reservoir Operation Problem Considering Inflow Variation (유입량의 변동성을 고려한 저수지 연계 운영 모형의 가중치 선정)

  • Kim, Min-Gyu;Kim, Jae-Hee;Kim, Sheung-Kown
    • Journal of Korea Water Resources Association
    • /
    • v.41 no.1
    • /
    • pp.1-15
    • /
    • 2008
  • The purpose of this study is to propose a procedure that will be able to find the most efficient sets of weight coefficients for the Geum-River basin in Korea. The result obtained from multi-objective optimization model is inherently sensitive to the weight coefficient on each objective. In multi-objective reservoir operation problems, the coefficient setting may be more complicated because of the natural variation of inflow. Therefore, for multi-objective reservoir operation problems, it may be important for modelers to provide reservoir operators with appropriate sets of weight coefficients considering the inflow variation. This study presents a procedure to find an appropriate set of weight coefficients under the situation that has inflow variation. The proposed procedure uses GA-CoMOM to provide a set of weight coefficient sets. A DEA-window analysis and a cross efficiency analysis are then performed in order to evaluate and rank the sets of weight coefficients for various inflow scenarios. This proposed procedure might be able to find the most efficient sets of weight coefficients for the Geum-River basin in Korea.

Analysis of Research for the Actual State and Management of Automated Horticultural Facilities (경북지역 현대화 원예시설의 관리실태 조사분석)

  • 정현교;이기명;박규식
    • Journal of Bio-Environment Control
    • /
    • v.5 no.2
    • /
    • pp.174-186
    • /
    • 1996
  • This study was carried out in order to understand the plan, design, constructing and actual condition of management of modernized horticultural facilities in Kyungpook Province which had been constructed from 1992 to 1995 funded by Government support. The aim of this study is to provide reference data for success of the forth project. It was performed by making up a question about driving of project and management condition of equipment after constructing. The results obtained from this study are as follows: 1. 73.5% of facilities horticulture farmhouse recognized that the prospect of greenhouse is bright, but 92.5% of the farmhouse also recognised that they need technical consultation on protected horticulture farming. Therefore, technical educations would must be enhanced about foundation of greenhouse and cultivation technique. 2. The holding times of explanatory meetings, cause of understanding to farmhouse, were one or two times in greenhouse construction, and 62.5% of the farmhouse expressed the insufficiency at the explanation and educational data. For this reason, it was judged that the construction contract had been delayed more than 5 months in 49.3% of the farmhouse after the decision of project budget. 3. In constructing after a contract, the rates of construction delay is 53.4% and defect occurrence is 41.1%. The biggest reasons of construction delay was insufficiency of worker and materials supply. Each percentage is 29.1%. And the reason of defect occurrence is badness of machinery equipment(62.9% ). 4. In management of greenhouse, a pipe-constructed plastic film greenhouse changes plastic film every one and three years because of sticking dust on plastic film. It was needed to about in cleaning technique of coverings. Because that used 3-5 years only half of the expected life span. 5. The order of broken rating in the subsidiary equipment is like this lollop ventilator (42.8%), a general control system(33.3%) especially, in the case of a general control system, the rate of all family can control is 52.7%. so, it is time to develop easy control equipment which every one could use as soon as possible. 6. When choose heat generator as decide capacity, the most priority is the mount of heat generator the percent is 45.5% heat generator and as decide model, the private purchase's percent is 77.3%. It is higher than a public bidding heat generator the percent is 22.7% heat generator when it compare with a public bidding. In the case of $CO_2$ generator, using rate is only 19.0%. The using rate is very low, so it needs education how to use depends on the way of the subsidiary equipment. 7. In the case of seedlings, it is asked to use factory-processed seedling effectively. because it's difficult to get security of labors(58.8%), hoped crops (55.9%) access same crops(29.4%) much more and changing of crops depends on market situation. that is the main reason the lack of knowhow.

  • PDF

Extending Role-based Access Control for Privacy Preservation in Academic Affairs System (교무업무시스템에서의 개인정보보호를 위한 역할기반 접근 제어 확장)

  • Kim, Bo-Seon;Hong, Eui-Kyeong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.171-179
    • /
    • 2008
  • RBAC(Role based Access Control) is effective way of managing user's access to information object in enterprise level and e-government system. The concept of RBAC is that the access right to object in a system is not directly assigned o users but assigned by being a member of a role which is defined in a organization. RBAC is utilized for controling access range of privacy but it does not support the personal legal right of control over information and right of limited access to the self. Nor it contains the way of observation of privacy flow that is guided in a legal level. In this paper, extended RBAC model for protecting privacy will be suggested and discussed. Two components of Data Right and Assigning Data Right are added to existed RBAC and the definition of each component is redefined in aspect of privacy preservation. Data Right in extended RBAC represents the access right to privacy data. This component provides the way of control over who can access which privacy and ensures limitation of access quantity of privacy. Based on this extended RBAC, implemented examples are presented and the evaluation is discussed by comparing existed RBAC with extended RBAC.

선택 실험법을 이용한 친환경 보일러의 시장 점유율 예측

  • Kim, Mi-Jeong;Bae, Jeong-Hwan
    • Environmental and Resource Economics Review
    • /
    • v.21 no.3
    • /
    • pp.595-625
    • /
    • 2012
  • Recently environment-friendly pellet boilers have interests as emissions of greenhouse gases are regulated internationally and energy security becomes more important to oil addicted countries including Republic of Korea. But the Korean market for pellet boilers is on the initial stage due to the high production costs relative to other conventional boilers. Hence the Korean government has supported financially and promoted the pellet boiler business. In this sense, it would contribute market stratergy and effective promotion policy for both of the government and private companies if we can forecast market shares of pellet boilers appropriately. For this purpose, this study surveyed potential consumers' preferences on pellet boilers among various alternatives using a choice experiment reflecting intangible costs. As the market share of new technology increases, intangible costs decline. According to different intangible cost scenarios, we experimented people's preferences on oil, gas, electric, and pellet boilers. A multinomial logit model was employed to estimate coefficient parameters of common attributes for various alternative boilers. Based on the estimates, we forecasted market shares of individual boilers. We found that as intangible costs decline, the market share of pellet boiler increase substantically while market shares of electric and gas boilers decrease dramatically. The market share of oil boiler did not change significantly. Meanwhile, as people are more rich, more educated, and exposed to advertisement on pellet boilers, the likelihood of choosing the pellet boiler increases.

  • PDF

A Study on the Influence of the Expectation and Perceived Performance of the Online Science & Technology Information Service Quality on User Satisfaction and Royalty (온라인 과학기술정보 서비스 품질에 대한 기대수준과 성과에 대한 지각수준이 이용자 만족도와 충성도에 미치는 영향)

  • Kim, Wan-Jong;Kim, Hye-Sun;Hyun, Mi-Hwan
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.3
    • /
    • pp.207-228
    • /
    • 2013
  • The purpose of this study is to reveal the influence of the expectation and perceived performance of the online science & technology information service quality on user satisfaction and royalty. To achieve this goal, we use the NDSLQual model to measure the quality of NDSL service. The results were as follows: First, among seven expectation factors, four factors (reliability, convenience, system usability and information quality) had a positive effect on the user satisfaction. Second, while service recovery had a negative effect on the royalty, the other six factors (reliability, convenience, system usability, responsiveness, security and information quality) had a positive effect on the royalty. Third, among seven perceived performance factors, three factors (reliability, convenience and information quality) had a positive effect on the user satisfaction. Fourth, among seven perceived performance factors, three factors (reliability, convenience and information quality) had a positive effect on the royalty. As a result, information quality, reliability and convenience of the expectation and perceived performance are common factors influencing user satisfaction and royalty.

A Mobile Payment System Based-on an Automatic Random-Number Generation in the Virtual Machine (VM의 자동 변수 생성 방식 기반 모바일 지급결제 시스템)

  • Kang, Kyoung-Suk;Min, Sang-Won;Shim, Sang-Beom
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.6
    • /
    • pp.367-378
    • /
    • 2006
  • A mobile phone has became as a payment tool in e-commerce and on-line banking areas. This trend of a payment system using various types of mobile devices is rapidly growing, especially in the Internet transaction and small-money payment. Hence, there will be a need to define its standard for secure and safe payment technology. In this thesis, we consider the service types of the current mobile payments and the authentication method, investigate the disadvantages, problems and their solutions for smart and secure payment. Also, we propose a novel authentication method which is easily adopted without modification and addition of the existed mobile hardware platform. Also, we present a simple implementation as a demonstration version. Based on virtual machine (VM) approach, the proposed model is to use a pseudo-random number which is confirmed by the VM in a user's mobile phone and then is sent to the authentication site. This is more secure and safe rather than use of a random number received by the previous SMS. For this payment operation, a user should register the serial number at the first step after downloading the VM software, by which can prevent the illegal payment use by a mobile copy-phone. Compared with the previous SMS approach, the proposed method can reduce the amount of packet size to 30% as well as the time. Therefore, the VM-based method is superior to the previous approaches in the viewpoint of security, packet size and transaction time.

A Study on the necessity of Open Source Software Intermediaries in the Software Distribution Channel (소프트웨어 유통에 있어 공개소프트웨어 중개자의필요성에 대한 연구)

  • Lee, Seung-Chang;Suh, Eung-Kyo;Ahn, Sung-Hyuck;Park, Hoon-Sung
    • Journal of Distribution Science
    • /
    • v.11 no.2
    • /
    • pp.45-55
    • /
    • 2013
  • Purpose - The development and implementation of OSS (Open Source Software) led to a dramatic change in corporate IT infrastructure, from system server to smart phone, because the performance, reliability, and security functions of OSS are comparable to those of commercial software. Today, OSS has become an indispensable tool to cope with the competitive business environment and the constantly-evolving IT environment. However, the use of OSS is insufficient in small and medium-sized companies and software houses. This study examines the need for OSS Intermediaries in the Software Distribution Channel. It is expected that the role of the OSS Intermediary will be reduced with the improvement of the distribution process. The purpose of this research is to prove that OSS Intermediaries increase the efficiency of the software distribution market. Research design, Data, and Methodology - This study presents the analysis of data gathered online to determine the extent of the impact of the intermediaries on the OSS market. Data was collected using an online survey, conducted by building a personal search robot (web crawler). The survey period lasted 9 days during which a total of 233,021 data points were gathered from sourceforge.net and Apple's App store, the two most popular software intermediaries in the world. The data collected was analyzed using Google's Motion Chart. Results - The study found that, beginning 2006, the production of OSS in the Sourceforge.net increased rapidly across the board, but in the second half of 2009, it dropped sharply. There are many events that can explain this causality; however, we found an appropriate event to explain the effect. It was seen that during the same period of time, the monthly production of OSS in the App store was increasing quickly. The App store showed a contrasting trend to software production. Our follow-up analysis suggests that appropriate intermediaries like App store can enlarge the OSS market. The increase was caused by the appearance of B2C software intermediaries like App store. The results imply that OSS intermediaries can accelerate OSS software distribution, while development of a better online market is critical for corporate users. Conclusion - In this study, we analyzed 233,021 data points on the online software marketplace at Sourceforge.net. It indicates that OSS Intermediaries are needed in the software distribution market for its vitality. It is also critical that OSS intermediaries should satisfy certain qualifications to play a key role as market makers. This study has several interesting implications. One implication of this research is that the OSS intermediary should make an effort to create a complementary relationship between OSS and Proprietary Software. The second implication is that the OSS intermediary must possess a business model that shares the benefits with all the participants (developer, intermediary, and users).The third implication is that the intermediary provides an OSS of high quality like proprietary software with a high level of complexity. Thus, it is worthwhile to examine this study, which proves that the open source software intermediaries are essential in the software distribution channel.

  • PDF

A Study on the Unmanned convenience Store Operation System from the Viewpoint of Visual Merchandising (비주얼 머천다이징 관점에서의 무인 편의점 운영시스템에 관한 연구)

  • Seo, Jung-Hwa;Yang, Hoe-Chang;Park, Chul-Ju;Youn, Myoung-Kil
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.12
    • /
    • pp.45-53
    • /
    • 2018
  • Purpose - The purpose of the study was to investigate operation system of current convenience store and competing retail store and to find out development of unattended convenience store. Operators can save labor cost and solve labor seeking when opening shop under suitable environment and commerce area, and assure of employee's safety. Customers are allowed to select commodity comfortably without disclosure of face and to shorten standby time at simple store opening, buying and paying and to produce convenient living environment by financing, delivery and goods control. This study examined effect and problems of operation of existing and unattended convenience store from point of view of visual merchandising to find out model of unattended convenience store and to strengthen competitiveness of convenience store business. Research design, data, and methodology - Research procedure of accomplishment of goal of the study was: The study investigated state of distribution business, and role and definition of VMD. First, VMD played an important role of promotion and competitiveness of unattended convenience stores. Second, the author investigated research and cases of unattended convenience stores 14 months, that is to say, from August 15, 2017 to October 15, 2018. Third, the author investigated on-the-spot three of common convenience stores, three of unattended convenience stores and three of retailers one month, that is to say, June 1, 2018 to July 1, 2018. The subject was convenience stores and retailers selling similar type of products at Seoul and metropolitan area. Results - Layout, selling place, brand identity, goods assortment, authentication system, product information cognition and control, buying and payment system, security system, salesmen, promotion and other services should be improved from point of view of merchandising. Structure, furniture, lighting, voice, façade, VP, PP, IP and POP should be developed. Conclusions - Unattended convenience stores saved operating cost and lessened labor and gave visitors convenience and comfortable shopping and made use of resources effectively. Further studies with quantitative analysis shall find out strategic conditions for promotion of unattended convenience stores.