• Title/Summary/Keyword: disclosure system

Search Result 282, Processing Time 0.02 seconds

A Study on the Methods to Improve Records Management of the National University: Focused on Industry-University Cooperation Center of the Foothold National Universities (국립대학교 기록관리 현황 및 개선방안 연구 - 거점국립대학교 산학협력단을 중심으로 -)

  • Bae, Sung Jung;Kim, Tae Young;Han, Hye Won;Kim, Yong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.4
    • /
    • pp.151-178
    • /
    • 2015
  • This study aims to identify the problems of the records management of the foothold national university related university-industry collaboration. For these purpose, the study conducted a literature survey. Moreover, this study compared and analyzed the content of university archives and university-industry collaboration web sites. In addition, we gained the materials from the national archives in Korea thorough a request of information disclosure. It was found that problems and improvements in terms of institutional and achievement management. Consequently, based on the analysis, cooperation framework between university archives and university-industry collaboration was developed. With the proposed system, the academic utilization of university-industry collaboration records can be facilitated.

An Analysis on the Competitiveness of the Oil Refinery Market in South Korea

  • PARK, Heedae
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.6
    • /
    • pp.145-155
    • /
    • 2020
  • This study analyzes the degree of competition in the oil refinery market in Korea, which is considered an oligopoly market. The price of gasoline and diesel and the quantity of supply are used to identify the market competition. We also analyze whether the oil tax reduction policy has affected market competition. The competitiveness of the market was examined using monthly data from 2008 to 2019. Bresnahan-Lau method was employed to estimate the degree of competition in the oil refinery market, which is frequently used in the industrial studies. The analysis shows that the gasoline and diesel markets seem close to a perfect competitive market. Also, the tax cut has weakened market competition. In other words, the monopolistic power has increased in the market, so consumers have not benefit from the price cuts as much as tax cuts. Although the oil refinery market where four major companies are competing, the government's monitoring and price disclosure system help the market to be highly competitive as much as a perfect competition market. The tax cut, in the high oil price era, has a negative effect on the competition because of an information asymmetry about the price-setting process between suppliers and consumers.

Target Range Estimation Method using Ghost Target in the Submarine Linear Array Sonar (잠수함 선배열소나의 허위표적 정보를 이용한 표적의 거리추정 기법)

  • Choi, Byungwoong;Kim, Kyubaek
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.5
    • /
    • pp.532-537
    • /
    • 2015
  • In this paper, we propose target range estimation method using ghost target in the submarine linear array sonar. Usually, when submarine detect target, they use passive sonar detection to avoid self-disclosure by active sonar transmission. But, originally, passive linear array sonar have limitation for target range estimation and additional processing is required to get target range information. For the case of near-field target, typical range estimation method is using multiple information by multipath effect in underwater environment. Acoustic signal generated from target are propagated along with numerous multipath in underwater environment. Since multipath target signals received in the linear array sonar have different conic angles each other, ghost target is appeared at the bearing different with real target bearing and sonar operator can find these information on the operation console. Under several assumption, this geometric properties can be analysed mathematically and we get the target range by derivation of this geometric equations using measured conic angles of real target and ghost target.

Survey on Status of Food Packaging and Design for Status of Small and Medium Domestic Food Enterprises (국내 중소식품업체의 포장·디자인 기술 관련 현황 분석)

  • Kim, A-Young;Kim, Eun-Mi;Chang, Yoon-Je;Jeong, Seung-Weon;Shim, You-Shin
    • Journal of the Korean Society of Food Culture
    • /
    • v.32 no.1
    • /
    • pp.39-51
    • /
    • 2017
  • The purpose of this study was to analyze the current status relating to food packaging and design for status of small and medium food enterprises. A company survey was conducted from June to October, 2015 and targeted 1300 small and medium domestic food enterprises. Finally, a total of 1300 (recovery rate 100%) useable data were selected. Statistical analyses were performed on the data utilizing the SPSS PASW Statistics 18.0 for Windows, such as descriptive statistics and frequency analysis. According to the results, awareness and importance of food labeling were high, but performance of English inscription of product name was relatively low. The most important reason for food labeling was 'providing correct information on food' 910 (72.8%). Accordingly, a system which can provide the latest information by continuously monitoring mandatory disclosure requirements for types of foods in individual countries is needed.

Job Analysis of Records Managers based on the AHP Method (AHP 방법에 의한 기록연구사의 직무분석)

  • Lee, Seong-Tae
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.9 no.2
    • /
    • pp.133-158
    • /
    • 2009
  • This study started from recognizing the problem that neither the identity nor the role of records managers is clarified enough. Therefore, this study identifies the function of the records managers and how it should be carried. The method of functional analysis was used to collect information, and then the AHP method to analyze te core functions of the records managers. As a result, core functions were identified as follows: records management policy making, education, production control, records schedule management, collecting, transferring, description, appraisal, de-accessioning, records center management, disclosure, perusal service, and records management system. Therefore, this study presents that identity and role of the records managers as well as the priorities of the job.

A Secure Protocol for the Electronic Auction (전자경매를 위한 보안 프로토콜)

  • Shi, Wenbo;Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.29-36
    • /
    • 2007
  • Recently, Jaiswal et al. proposed a protocol to improve the multi-agent negotiation test-bed which was proposed by Collins et al. Using publish/subscribe system, time-release cryptography and anonymous communication, their protocol gives an improvement on the old one. However, it is shown that the protocol also has some security weaknesses: such as replay data attack and DOS (denial-of-service) attack, anonymity disclosure, collusion between customers and a certain supplier. So proposed protocol reduces DOS attack and avoids replay data attack by providing ticket token and deal sequence number to the supplier. And it is proved that the way that market generates random number to the supplier is better than the supplier do by himself in guaranteeing anonymity. Market publishes interpolating polynomial for sharing the determination process data. It avoids collusion between customer and a certain supplie

  • PDF

Improvement Method of ELIS Local Laws and Regulations Format for Personal Information Protection (개인정보보호를 위한 ELIS의 자치법규서식 개선방안)

  • Choi, Chul-Jae;Lee, Young-Sik;Lee, Tae-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1017-1024
    • /
    • 2016
  • In this paper, we have figured out status and demand about personal information in local laws and regulations of the four major city out of the municipality 18 institutions of Gangwon Province. To take advantage of the autonomous regulations Information System(ELIS), and research and analysis in the autonomy regulations of local governments to object to the attachment format. To object to the Attachment to the request of the resident registration number notation is a super key. There is a disclosure resistance sense of personal information, and research analysis of the smart phone number and home phone number. We have proposed the urgent development of automatic search engine of PIMS compliance with personal information.

Treatment Information based Risk Evaluation Method in Medical Information Systems (의료정보시스템에서 치료정보 기반 위험도 평가 방법론)

  • Choi, Donghee;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.9
    • /
    • pp.441-448
    • /
    • 2016
  • RBAC(Role-Based Access Control), which is widely used in Medical Information Systems, is vulnerable to illegal access through abuse/misuse of permissions. In order to solve this problem, treatment based risk assessment of access requests is necessary. In this paper, we propose a risk evaluation method based on treatment information. We use network analysis to determine the correlation between treatment information and access objects. Risk evaluation can detect access that is unrelated to the treatment. It also provides indicators for information disclosure threats of insiders. We verify the validity using large amounts of data in real medical information systems.

Quality of Corporate Governance: A Review from the Literature

  • Rahman, Md. Musfiqur;Khatun, Naima
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.4 no.1
    • /
    • pp.59-66
    • /
    • 2017
  • The purpose of this paper is to review the quality of corporate governance from the prior empirical literature. This study finds that most of the researchers developed the self structured corporate governance index and few researchers used the corporate governance index provided by rating agencies. This study also finds that there is no uniform basis to measure the corporate governance quality and observed the variation in terms of overall and individual attributes of corporate governance; sub-indices of corporate governance; scoring system; weighted and un-weighted method; statistical method; time period; financial and non financial companies; code of corporate governance; listing requirement; disclosure practices; legal environment; firms characteristics; and country perspective. This study also observed that overall corporate governance quality is very low in most of the studies and even quality of corporate governance varies in the firms within the same country. This study recommends that the boundary of corporate governance quality should be defined based on the agreed set of rules and regulation, code of governance and practices. This study also suggests that the regulator and policy makers should more emphasize on code of corporate governance and regulatory framework and monitoring to improve the quality of corporate governance.

Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments (IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가)

  • Jin, Byungwook;Jung, Dongwoog;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.35-41
    • /
    • 2016
  • Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.