• Title/Summary/Keyword: digital risk

Search Result 825, Processing Time 0.021 seconds

Perception differences between users and policy-makers on technology protection support system for small and medium-sized businesses (중소기업 기술보호지원제도에 대한 이용자와 정책담당자의 인식차이 분석)

  • Park, Sanghoon;Cho, Namwook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.37-48
    • /
    • 2017
  • As the risk of technical leakage is increasing, technology protection support systems for small and medium-sized businesses have gained attention. This paper analyzed the perception gap of the user and policy-maker regarding technology protection support systems. First, to identify key elements of technology protection support systems and construct measurement factors, interviews with experts are conducted. Then, surveys are conducted to analyze the perception differences between the users and policy-makers. Factor analysis and ANOVA have been utilized to analyze survey results. The result shows that the perception gaps exist in the following areas: management system, cost reduction, copyright protection, customer satisfaction, leakage prevention, and awareness. To enhance the effectiveness of technology protection support systems, this paper suggests technology protection support systems should be customized in terms of the company's size and type of busines.

Measurement of Skin Dose Distribution for the Mobile X-ray Unit Collimator Shielding Device (이동형 X선 장치 차폐도구 제작을 통한 표면선량 분포 측정)

  • Hong, Sun-Suk;Kim, Deuk-Yong
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.12 no.1
    • /
    • pp.5-8
    • /
    • 2010
  • Opened a court in February 10, 2006, a rule of safety management of the diagnosis radiation system was promulgated for safety of the radiation worker, patients and patients' family members. The purpose of this rule is to minimize the risk of being exposed to radiation during the process of handling X-ray. For this reason, we manufactured shielding device of mobile X-ray unit collimator for diminution of skin dose. Shielding device is made to a thickness of Pb 0.375mm. For portable chest radiography, we measured skin dose 50cm from center ray to 200cm at intervals of 20cm by Unfors Xi detector. As a result, a rule of safety management of the diagnosis radiation system has been strengthened. But there are exceptions, such as ER, OR, ICU to this rule. So shielding device could contribute to protect unnecessary radiation exposure and improve nation's health.

  • PDF

위험전압 측정기의 설계 및 제작

  • Jang, Un-Yong;Park, Dae-Won;Han, Ju-Seop;Gil, Gyeong-Seok
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2010.03b
    • /
    • pp.25-25
    • /
    • 2010
  • This paper describes the design and fabrication of a Risk Voltage Meter (RVM) which can analyze the step and touch voltages in grounding systems. The meter consists of a sine-wave power source which generates up to 300 [$V_{rms}$] in ranges of 45 [Hz]~1 [kHz], a 8 Ch. data acquisition module, and a personal computer. Also, a noise elimination method by a digital band-pass filter during measurement is proposed.

  • PDF

Improvement Problems Electronic Monitoring System for Sexual Assault Offender (성폭력범죄자 전자감시제도의 문제점과 개선방안)

  • Kim, Sang Gyun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.39-43
    • /
    • 2014
  • Electronic monitoring system was recently introduced as an effective means of controlling certain criminal offenders. Korean society manages ex-convicts only in reliance on the electronic monitoring system, which has a clear limit. For this reason, The reorientation program should be put before anything to subdivide the perpetrators equipped with the electronic monitoring device and separate them from the others from the start, or identify their criminal propensity and heal them.

A Study on Improving the Reliability of Cloud Computing (클라우드 컴퓨팅의 신뢰성 향상 방안에 관한 연구)

  • Yang, Jeong Mo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.107-113
    • /
    • 2012
  • Cloud computing has brought changes to the IT environment. Due to the spread of LTE, users of cloud services are growing more. This which provides IT resources to meet the needs of users of cloud services are noted as a core industry. But it is not activated because of the security of personal data and the safety of the service. In order to solve this, intrusion detection system is constructed as follows. This protects individual data safely which exists in the cloud and also protects information exhaustively from malicious attack. The cause of most attack risk which exists to cloud computing can find in distributed environment. In this study, we analyzed about necessary property of network-based intrusion detection system that process and analyze large amount of data which occur in cloud computing environment. Also, we studied functions which detect and correspond attack occurred in interior of virtualization.

Robust Web Server System Using Virtual Machine Against DOS Attack (가상머신을 이용한 DoS 공격에 강건한 웹 서버 시스템)

  • Park, Seung Kyu;Yang, Hawan Seok;Kim, Bae Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.1-7
    • /
    • 2013
  • The cloud computing is technology which gives flexible and solid infrastructure to IT environment. With this technology multiple computing environment can be consolidated in to a single server so that maximize system resource utilization. Better processing power can be achieved with less system resource. IT manager can cope with increasing unnecessary cost for additional server and management cost as well. This means a enterprise is able to provide services with better quality and create new services with surplus resource. The time required for recovery from system failure will be reduced from days to minutes. Enhanced availability and continuity of enterprise business minimize the codt and the risk produced by service discontinuity. In this paper, we propose framework architecture that is strong against denial-of-service attack.

Security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks (무선 센서 네트워크 환경을 위한 보안성이 향상된 프라이버시 보호형 two-factor 인증 프로토콜)

  • Choi, Younsung;Chang, Beom-Hwan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.71-84
    • /
    • 2019
  • Various researchers conducted the research on two-factor authentication suitable for wireless sensor networks (WSNs) after Das first proposed two-factor authentication combining the smart card and password. After then, To improve the security of user authentication, elliptic curve cryptography(ECC)-based authentication protocols have been proposed. Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSM for resolving various problems of ECC-based authentication protocols. However, Jiang et al.'s protocol has the vulnerabilities on a lack of mutual authentication, a risk of SID modification and a lack of sensor anonymity, and user's ID exposed on sensor node Therefore, this paper proposed security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks to solve the problem of Jiang et al.'s protocol, and security analysis was conducted for the proposed protocol.

A Study on the Development of ADWHM(Advanced Digital Watt-Hour Meter) (차세대 디지털 적산전력계 개발에 대한 연구)

  • Ko, Yun-Seok;Yun, Sang-Moon;Seo, Seong-Jin
    • Proceedings of the KIEE Conference
    • /
    • 2003.07a
    • /
    • pp.262-264
    • /
    • 2003
  • This paper develops an ADWHM(Advanced Digital Watt Hour Meter) based on RISK type'8bit micro-controller, which has voltage management data recording function, load management data recording function as well as the existing watt-hour data recording data function. It can enhance greatly the economics of the existing remote meter reading system. Also it can improve highly the quality of power supplied to the electric customer by minimizing the voltage management cost and by enhancing the efficiency of load management.

  • PDF

A Study on Discount/Capitalization Rates for Valution of Culture Content Enterprises (문화(文化)콘텐츠기업(企業) 가치평가(價値評價)를 위한 할인율(割引率) 결정(決定)에 관한 연구(硏究))

  • Gheem, In-Choll;Joo, Hyung-Kun
    • Journal of Digital Convergence
    • /
    • v.3 no.1
    • /
    • pp.115-148
    • /
    • 2005
  • This study is intended to suggest a more reasonable and practical method of estimating discount & capitalization rate for valuation of closely-held culture content business, that is, to modify the Buildup Summation Model(which is recommended for the closely-held business by the NACVA) by adopting the weighted ratings in the CT Project Investment Evaluation of the Korea Culture Contents Association to risk factors of the Buildup Summation Model. This method is ease to apply for closely-held culture content business and has advantages in applying the weighted rates based on the characteristics of respective culture contents. And it can make up for the Weighted Average Cost of Capital (WACC) which shows generally low discount rates.

  • PDF

A Study on Conquest Plans of the Barrier and Resistance in Innovation Management (혁신관리에 있어서 장애와 저항의 극복방안)

  • Lee, Seung-Hee;Noh, Kyoo-Sung
    • Journal of Digital Convergence
    • /
    • v.3 no.1
    • /
    • pp.9-25
    • /
    • 2005
  • The purpose of this study is to explore conquest plans of the barrier and resistance in innovation management. In addition, this study is to describe the model of innovation resistance that reflects adoption process stages and identify the factors that drive the resistance of consumers and the barriers. Whenever organizations try to plan and implement some kind of innovation in organizations, they confront the resistance and barriers in many ways. By understanding innovation resistance and barrier, organizations can not only design better innovations but can develop strategies to reduce resistance and conquer the barriers. Thus they accelerate innovation. Also, these results indicate that people resist innovation strongly when it betrays their value, needs and beliefs or when they felt the pressure on self-conviction and mental risk, loss, and lack of knowledge. Understanding the factors that drive the innovation resistance and barrier has important implications for both theoretical development and managerial action.

  • PDF