• 제목/요약/키워드: digital risk

검색결과 825건 처리시간 0.02초

중소기업 기술보호지원제도에 대한 이용자와 정책담당자의 인식차이 분석 (Perception differences between users and policy-makers on technology protection support system for small and medium-sized businesses)

  • 박상훈;조남욱
    • 디지털산업정보학회논문지
    • /
    • 제13권1호
    • /
    • pp.37-48
    • /
    • 2017
  • As the risk of technical leakage is increasing, technology protection support systems for small and medium-sized businesses have gained attention. This paper analyzed the perception gap of the user and policy-maker regarding technology protection support systems. First, to identify key elements of technology protection support systems and construct measurement factors, interviews with experts are conducted. Then, surveys are conducted to analyze the perception differences between the users and policy-makers. Factor analysis and ANOVA have been utilized to analyze survey results. The result shows that the perception gaps exist in the following areas: management system, cost reduction, copyright protection, customer satisfaction, leakage prevention, and awareness. To enhance the effectiveness of technology protection support systems, this paper suggests technology protection support systems should be customized in terms of the company's size and type of busines.

이동형 X선 장치 차폐도구 제작을 통한 표면선량 분포 측정 (Measurement of Skin Dose Distribution for the Mobile X-ray Unit Collimator Shielding Device)

  • 홍선숙;김득용
    • 대한디지털의료영상학회논문지
    • /
    • 제12권1호
    • /
    • pp.5-8
    • /
    • 2010
  • Opened a court in February 10, 2006, a rule of safety management of the diagnosis radiation system was promulgated for safety of the radiation worker, patients and patients' family members. The purpose of this rule is to minimize the risk of being exposed to radiation during the process of handling X-ray. For this reason, we manufactured shielding device of mobile X-ray unit collimator for diminution of skin dose. Shielding device is made to a thickness of Pb 0.375mm. For portable chest radiography, we measured skin dose 50cm from center ray to 200cm at intervals of 20cm by Unfors Xi detector. As a result, a rule of safety management of the diagnosis radiation system has been strengthened. But there are exceptions, such as ER, OR, ICU to this rule. So shielding device could contribute to protect unnecessary radiation exposure and improve nation's health.

  • PDF

위험전압 측정기의 설계 및 제작

  • 장운용;박대원;한주섭;길경석
    • 한국전기전자재료학회:학술대회논문집
    • /
    • 한국전기전자재료학회 2010년도 춘계학술대회 논문집
    • /
    • pp.25-25
    • /
    • 2010
  • This paper describes the design and fabrication of a Risk Voltage Meter (RVM) which can analyze the step and touch voltages in grounding systems. The meter consists of a sine-wave power source which generates up to 300 [$V_{rms}$] in ranges of 45 [Hz]~1 [kHz], a 8 Ch. data acquisition module, and a personal computer. Also, a noise elimination method by a digital band-pass filter during measurement is proposed.

  • PDF

성폭력범죄자 전자감시제도의 문제점과 개선방안 (Improvement Problems Electronic Monitoring System for Sexual Assault Offender)

  • 김상균
    • 디지털융복합연구
    • /
    • 제12권2호
    • /
    • pp.39-43
    • /
    • 2014
  • 전자감시제도는 범죄자를 통제하기 위한 수단으로 최근에 도입되었다. 전자감시제도는 일정한 조건으로 석방된 범죄자가 지정 된 시간에 지정된 장소에 있는지 여부를 확인하기 위한 범죄자의 원격감시제도의 하나로 서 새로운 사회내처우의 하나이다. 전자감시제도는 현재 초기단계이기 때문에 그에 따른 문제점들도 많겠지만, 꾸준한 제도의 보완을 통해 국민들이 범죄로부터 안전할 수 있도록 제도적인 보완작업이 지속적으로 이루어져야 할 것이다.

클라우드 컴퓨팅의 신뢰성 향상 방안에 관한 연구 (A Study on Improving the Reliability of Cloud Computing)

  • 양정모
    • 디지털산업정보학회논문지
    • /
    • 제8권4호
    • /
    • pp.107-113
    • /
    • 2012
  • Cloud computing has brought changes to the IT environment. Due to the spread of LTE, users of cloud services are growing more. This which provides IT resources to meet the needs of users of cloud services are noted as a core industry. But it is not activated because of the security of personal data and the safety of the service. In order to solve this, intrusion detection system is constructed as follows. This protects individual data safely which exists in the cloud and also protects information exhaustively from malicious attack. The cause of most attack risk which exists to cloud computing can find in distributed environment. In this study, we analyzed about necessary property of network-based intrusion detection system that process and analyze large amount of data which occur in cloud computing environment. Also, we studied functions which detect and correspond attack occurred in interior of virtualization.

가상머신을 이용한 DoS 공격에 강건한 웹 서버 시스템 (Robust Web Server System Using Virtual Machine Against DOS Attack)

  • 박승규;양환석;김배현
    • 디지털산업정보학회논문지
    • /
    • 제9권1호
    • /
    • pp.1-7
    • /
    • 2013
  • The cloud computing is technology which gives flexible and solid infrastructure to IT environment. With this technology multiple computing environment can be consolidated in to a single server so that maximize system resource utilization. Better processing power can be achieved with less system resource. IT manager can cope with increasing unnecessary cost for additional server and management cost as well. This means a enterprise is able to provide services with better quality and create new services with surplus resource. The time required for recovery from system failure will be reduced from days to minutes. Enhanced availability and continuity of enterprise business minimize the codt and the risk produced by service discontinuity. In this paper, we propose framework architecture that is strong against denial-of-service attack.

무선 센서 네트워크 환경을 위한 보안성이 향상된 프라이버시 보호형 two-factor 인증 프로토콜 (Security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks)

  • 최윤성;장범환
    • 디지털산업정보학회논문지
    • /
    • 제15권4호
    • /
    • pp.71-84
    • /
    • 2019
  • Various researchers conducted the research on two-factor authentication suitable for wireless sensor networks (WSNs) after Das first proposed two-factor authentication combining the smart card and password. After then, To improve the security of user authentication, elliptic curve cryptography(ECC)-based authentication protocols have been proposed. Jiang et al. proposed a privacy-aware two-factor authentication protocol based on ECC for WSM for resolving various problems of ECC-based authentication protocols. However, Jiang et al.'s protocol has the vulnerabilities on a lack of mutual authentication, a risk of SID modification and a lack of sensor anonymity, and user's ID exposed on sensor node Therefore, this paper proposed security enhanced privacy-aware two-factor authentication protocol for wireless sensor networks to solve the problem of Jiang et al.'s protocol, and security analysis was conducted for the proposed protocol.

차세대 디지털 적산전력계 개발에 대한 연구 (A Study on the Development of ADWHM(Advanced Digital Watt-Hour Meter))

  • 고윤석;윤상문;서성진
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2003년도 하계학술대회 논문집 A
    • /
    • pp.262-264
    • /
    • 2003
  • This paper develops an ADWHM(Advanced Digital Watt Hour Meter) based on RISK type'8bit micro-controller, which has voltage management data recording function, load management data recording function as well as the existing watt-hour data recording data function. It can enhance greatly the economics of the existing remote meter reading system. Also it can improve highly the quality of power supplied to the electric customer by minimizing the voltage management cost and by enhancing the efficiency of load management.

  • PDF

문화(文化)콘텐츠기업(企業) 가치평가(價値評價)를 위한 할인율(割引率) 결정(決定)에 관한 연구(硏究) (A Study on Discount/Capitalization Rates for Valution of Culture Content Enterprises)

  • 김인철;주형근
    • 디지털융복합연구
    • /
    • 제3권1호
    • /
    • pp.115-148
    • /
    • 2005
  • This study is intended to suggest a more reasonable and practical method of estimating discount & capitalization rate for valuation of closely-held culture content business, that is, to modify the Buildup Summation Model(which is recommended for the closely-held business by the NACVA) by adopting the weighted ratings in the CT Project Investment Evaluation of the Korea Culture Contents Association to risk factors of the Buildup Summation Model. This method is ease to apply for closely-held culture content business and has advantages in applying the weighted rates based on the characteristics of respective culture contents. And it can make up for the Weighted Average Cost of Capital (WACC) which shows generally low discount rates.

  • PDF

혁신관리에 있어서 장애와 저항의 극복방안 (A Study on Conquest Plans of the Barrier and Resistance in Innovation Management)

  • 이승희;노규성
    • 디지털융복합연구
    • /
    • 제3권1호
    • /
    • pp.9-25
    • /
    • 2005
  • The purpose of this study is to explore conquest plans of the barrier and resistance in innovation management. In addition, this study is to describe the model of innovation resistance that reflects adoption process stages and identify the factors that drive the resistance of consumers and the barriers. Whenever organizations try to plan and implement some kind of innovation in organizations, they confront the resistance and barriers in many ways. By understanding innovation resistance and barrier, organizations can not only design better innovations but can develop strategies to reduce resistance and conquer the barriers. Thus they accelerate innovation. Also, these results indicate that people resist innovation strongly when it betrays their value, needs and beliefs or when they felt the pressure on self-conviction and mental risk, loss, and lack of knowledge. Understanding the factors that drive the innovation resistance and barrier has important implications for both theoretical development and managerial action.

  • PDF