• Title/Summary/Keyword: authorization

Search Result 505, Processing Time 0.034 seconds

A Study on the Effects of the R&D Activities and Patent on the Corporate Performance of Medical Device Firms in Korea (국내 의료기기 제조기업의 연구개발활동과 특허가 기업 경영성과에 미치는 영향에 관한 연구)

  • Kim, Dosung;Lee, Jungsoo;Cho, Sung Han;Kim, Min Seok;Kim, Nam-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.157-165
    • /
    • 2018
  • Companies conduct R&D for continuous development and enhancement of corporate value, and obtain patents as an intangible asset resulting from this process. This study screened 103 medical device firms whose R&D information, patent information, and management performance information were all published to determine how R&D activities and patents affect corporate operational performance. The number of patents, R&D costs, company type and Inno-Biz of the company were set as independent variables, and the companies' sales, intangible assets, operating profit ratios, net profit margins, corporate ratings and profit-related financial ratios were used as dependent variables. The results confirmed that R&D expenditure had negative (-) effects on most indicators, including sales volume, operating profit ratio, and net profit ratio, while it had positive (+) [ED highlight - these are unnecessary if negative and positive are also written out.] effects only on intangible assets. Additionally, domestic patents were found to have negative (-) effects on sales, cash flow ratings, and dropped capital return, and positive (+) effects on net profit growth. Moreover, the business performance variables affected by the company characteristics were sales volume and cash flow ratings. The medical device industry is dominated by small and medium-sized businesses Although research and development activities and patents have been shown to have a negative impact on corporate management in the short term, they are expected to have a positive long-term impact when reflecting the characteristics of the medical device industry that must undergo clinical trials and authorization procedures after R&D.

Design and Implementation of Blockchain Network Based on Domain Name System (블록체인 네트워크 기반의 도메인 네임 시스템 설계 및 구현)

  • Heo, Jae-Wook;Kim, Jeong-Ho;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.36-46
    • /
    • 2019
  • The number of hosts connected to the Internet has increased dramatically, introducing the Domain Name System(DNS) in 1984. DNS is now an important key point for all users of the Internet by allowing them to use a convenient character address without memorizing a series of numbers of complex IP address. However, relative to the importance of DNS, there still exist many problems such as the authorization allocation issue, the disputes over public registration, security vulnerability such as DNS cache poisoning, DNS spoofing, man-in-the-middle attack, DNS amplification attack, and the need for many domain names in the age of hyper-connected networks. In this paper, to effectively improve these problems of existing DNS, we proposed a method of implementing DNS using distributed ledger technology, blockchain, and implemented using a Ethereum-based platform. In addition, the qualitative analysis performance comparative evaluation of the existing domain name registration and domain name server was conducted, and conducted security assessments on the proposed system to improve security problem of existing DNS. In conclusion, it was shown that DNS services could be provided high security and high efficiently using blockchain.

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

Validity and reliability of the Korean version of the Quality of Recovery-40 questionnaire

  • Lee, Jun Ho;Kim, Deokkyu;Seo, Donghak;Son, Ji-seon;Kim, Dong-Chan
    • Korean Journal of Anesthesiology
    • /
    • v.71 no.6
    • /
    • pp.467-475
    • /
    • 2018
  • Background: The Quality of Recovery-40 (QoR-40) is a widely-used, self-rated, and self-completed questionnaire for postoperative patients. The questionnaire is intended to elicit information from each patient regarding the quality of recovery during the postoperative period. It is noteworthy, however, that an official Korean version of the QoR-40 (QoR-40K) has not been established. The purpose of this study was to develop the QoR-40K by translation and cultural adaptation process and to evaluate the validity and reliability of the QoR-40K. Methods: After pre-authorization from the original author of the QoR-40, the translation procedure was established and carried out based upon Beaton's recommendation to create a QoR-40K model comparable to the original English QoR-40. Two hundred surgical patients were enrolled, and each completed the questionnaire during the preoperative period, on the third day, and 1 month after surgery. The QoR-40K was compared with the visual analogue scale (VAS) and another health-related questionnaire, the Short-form Health Survery-36 (SF-36). The method of validation for QoR-40K included test-retest reliability, internal consistency, and level of responsiveness. Results: Spearman's correlation coefficient for test-retest reliability was 0.895 (P < 0.001), and Cronbach's alpha of the global QoR-40K on the third day after surgery was 0.956. A positive correlation was obtained between the QoR-40K and the mental component summary of SF-36 (${\rho}=0.474$, P < 0.001), and a negative correlation was observed between QoR-40K and VAS (${\rho}=-0.341$, P < 0.001). The standardized responsive mean of the total QoR-40K was 0.71. Conclusions: The QoR-40K was found to be as acceptable and reliable as the original English QoR-40 for Korean patients after surgery, despite the apparent differences in the respective patients' cultural backgrounds.

Shared Key and Public Key based Mobile Agent Authentication Scheme supporting Multiple Domain in Home Network Environments (홈 네트워크 환경에서 다중 도메인을 지원하는 공유키 및 공개키 기반의 이동 에이전트 인증 기법)

  • 김재곤;김구수;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.109-119
    • /
    • 2004
  • The home network environment can be defined as a network environment, connecting digital home devices such as computer systems, digital appliances, and mobile devices. In this kind of home network environments, there will be numerous local/remote interactions to monitor and control the home network devices and the home gateway. Such an environment may result in communication bottleneck. By applying the mobile agents that can migrate among the computing devices autonomously and work on behalf of the user, remote interactions and network traffics can be reduced enormously. The mobile agent authentication is necessary to apply mobile agent concept to the home network environments, as a prerequisite technology for authorization or access control to the home network devices and resources. The existing mobile agent systems have mainly used the public key based authentication scheme, which is not suitable to the home network environments, composed of digital devices of limited computation capability. In this paper, we propose a shared key based mobile agent authentication scheme for single home domain and expand the scheme to multiple domain environments with the public key based authentication scheme. Application of the shared key encryption scheme to the single domain mobile agent authentication enables to authenticate the mobile agent with less overhead than the public key based authentication scheme.

Rule-base Expert System for Privacy Violation Certainty Estimation (개인정보유출 확신도 도출을 위한 전문가시스템개발)

  • Kim, Jin-Hyung;Lee, Alexander;Kim, Hyung-Jong;Hwang, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.125-135
    • /
    • 2009
  • Logs from various security system can reveal the attack trials for accessing private data without authorization. The logs can be a kind of confidence deriving factors that a certain IP address is involved in the trial. This paper presents a rule-based expert system for derivation of privacy violation confidence using various security systems. Generally, security manager analyzes and synthesizes the log information from various security systems about a certain IP address to find the relevance with privacy violation cases. The security managers' knowledge handling various log information can be transformed into rules for automation of the log analysis and synthesis. Especially, the coverage of log analysis for personal information leakage is not too broad when we compare with the analysis of various intrusion trials. Thus, the number of rules that we should author is relatively small. In this paper, we have derived correlation among logs from IDS, Firewall and Webserver in the view point of privacy protection and implemented a rule-based expert system based on the derived correlation. Consequently, we defined a method for calculating the score which represents the relevance between IP address and privacy violation. The UI(User Interface) expert system has a capability of managing the rule set such as insertion, deletion and update.

The Meaning and the Legislative Suggestion about Data Manipulation of Pharmaceutical Companies in the Aspect of the Medicine Approval System (의약품 품목허가 제도에서 제약기업 자료조작의 의미와 입법 개선 방안-대법원 2008. 11. 13. 선고 2008두8628 판결을 중심으로-)

  • Park, Sungmin;Shin, Youngkee
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.4
    • /
    • pp.59-88
    • /
    • 2021
  • The National Assembly of the Republic of Korea recently enacted laws to fortify sanctions about data manipulation of pharmaceutical companies. The medicine approval system is the result of legislative efforts to prevent accidents that caused damages to patients' life and health. The medicine approval system is based on the trust that the data submitted by pharmaceutical companies is not manipulated. The Supreme Court of Korea clarified that strict standard shoud be required to secure the medicine safety in Supreme Court Decision 2008Du8628 decided November 13, 2008. We agree. This paper suggest legislation to weaken the economic incentives for pharmaceutical companies to choose data manipulation by minimizing the expected profit. In addition to revoking the marketing authorization of the medicine, the 'unfair' profits the pharmaceutical company has earned must be recovered. In addition, in order to increase the possibility to discover data manipulation, it is necessary to strengthen the review capacity and to activate the whistle-blowing.

A Study on Proving RMF A&A in Real World for Weapon System Development (무기체계 개발을 위한 RMF A&A의 실증에 관한 연구)

  • Cho, Kwangsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.817-839
    • /
    • 2021
  • To manage software safely, the military acquires and manages products in accordance with the RMF A&A. RMF A&A is standard for acquiring IT products used in the military. And it covers the requirements, acquisition through evaluation and maintenance of products. According to the RMF A&A, product development activities should reflect the risks of the military. In other words, developers have mitigated the risks through security by design and supply chain security. And they submit evidence proving that they have properly comply with RMF A&A's security requirements, and the military will evaluate the evidence to determine whether to acquire IT product. Previously, case study of RMF A&A have been already conducted. But it is difficult to apply in real-world, because it only address part of RMF A&A and detailed information is confidential. In this paper, we propose the evidence fulfilling method that can satisfy the requirements of the RMF A&A. Furthermore, we apply the proposed method to real-world drone system for verifying our method meets the RMF A&A.

A Study on Unauthorized Anchoring of Foreign-flag Vessels in Internal Waters and Territorial Sea (외국선박의 내수 및 영해 무단정박에 관한 연구)

  • Lim, Chae-Hyun;Lee, Chang-Hee;Jeong, Dae-Deuk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.2
    • /
    • pp.280-289
    • /
    • 2022
  • Internal Waters refer to the waters located at the landward side of a baseline and is completely under the sovereignty of a coastal state. However, the right of innocent passage of foreign-flag vessels is recognized in internal waters that are newly incorporated by establishing a straight baseline. Korea has a massive Internal Waters on its south-western coast where the straight baseline is adopted and has a wide Internal Waters that allows innocent passage. A foreign-flag vessel navigating the internal waters must be properly managed according to the interest of the coastal states such as the fishing·safety·security·environment around the Korean coast. Additionally, Territorial Sea comes under the sovereignty of a coastal state and it is a very important sea area for managing the interests of the coastal states. However, several collision accidents involving illegally anchored or drifted foreign-flag vessels have been occurring recently in the Korean Internal Waters and Territorial Sea, and such accidents are a threat to its interests. Thus, this paper analyzes the cases of collision of foreign-flag vessels that anchored or drifted without authorization, and examines domestic·international laws on the passage of foreign-flag vessel through Internal Waters and Territorial Waters. Finally, this paper suggests that unauthorized anchoring of foreign-flag vessels in Korean Internal Waters and Territorial Water violates the requirements for innocent passage and this violation is punishable according to related Acts; a desirable improvement plan for the legal system of passage through Internal Waters and Territorial Waters.

Applicability of QSAR Models for Acute Aquatic Toxicity under the Act on Registration, Evaluation, etc. of Chemicals in the Republic of Korea (화평법에 따른 급성 수생독성 예측을 위한 QSAR 모델의 활용 가능성 연구)

  • Kang, Dongjin;Jang, Seok-Won;Lee, Si-Won;Lee, Jae-Hyun;Lee, Sang Hee;Kim, Pilje;Chung, Hyen-Mi;Seong, Chang-Ho
    • Journal of Environmental Health Sciences
    • /
    • v.48 no.3
    • /
    • pp.159-166
    • /
    • 2022
  • Background: A quantitative structure-activity relationship (QSAR) model was adopted in the Registration, Evaluation, Authorization, and Restriction of Chemicals (REACH, EU) regulations as well as the Act on Registration, Evaluation, etc. of Chemicals (AREC, Republic of Korea). It has been previously used in the registration of chemicals. Objectives: In this study, we investigated the correlation between the predicted data provided by three prediction programs using a QSAR model and actual experimental results (acute fish, daphnia magna toxicity). Through this approach, we aimed to effectively conjecture on the performance and determine the most applicable programs when designating toxic substances through the AREC. Methods: Chemicals that had been registered and evaluated in the Toxic Chemicals Control Act (TCCA, Republic of Korea) were selected for this study. Two prediction programs developed and operated by the U.S. EPA - the Ecological Structure-Activity Relationship (ECOSAR) and Toxicity Estimation Software Tool (T.E.S.T.) models - were utilized along with the TOPKAT (Toxicity Prediction by Komputer Assisted Technology) commercial program. The applicability of these three programs was evaluated according to three parameters: accuracy, sensitivity, and specificity. Results: The prediction analysis on fish and daphnia magna in the three programs showed that the TOPKAT program had better sensitivity than the others. Conclusions: Although the predictive performance of the TOPKAT program when using a single predictive program was found to perform well in toxic substance designation, using a single program involves many restrictions. It is necessary to validate the reliability of predictions by utilizing multiple methods when applying the prediction program to the regulation of chemicals.