• Title/Summary/Keyword: industrial security

Search Result 1,731, Processing Time 0.023 seconds

The effect of Women' social networking on affective commitment and individual adaptation performance (인적 네트워킹이 정서적 조직몰입과 개인적응성과에 미치는 영향: 여성 공무원을 대상으로)

  • Na, Ki Hwan;Choe, Min Seok;Han, Su Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.499-509
    • /
    • 2016
  • The number of female government employees is increasing steadily; therefore, the importance of their effective management is also increasing. Recently, female government employees have organized and exploited their social networks to achieve career success. To obtain a better understanding of the consequences of social networking and its impact on female government employees, 262 female employees were asked to provide details about their experiences and attitudes regarding networking behavior (internal and external networking) and how they influenced affective commitment and individual adaptation performance. The results confirmed that social networking significantly increases emotional sharing, and leads to high levels of affective commitment and individual adaptation performance. The moderating roles that positive psychological capital play in the relationships between social networking (internal and external) and emotional sharing were also investigated. The results confirmed that positive psychological capital enhances the impact internal social networking has on affective commitment and individual adaptation performance. Managerial implications for developing effective female employee management strategies were provided for government managers. Based on these results, the theoretical and practical implications of the research findings are discussed, and recommendations for future research are provided.

A Reliability Enhancement Technique of Mobile Payment (모바일 결제의 신뢰성 향상 방안)

  • Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.319-325
    • /
    • 2016
  • A variety of services for mobile payments by the activation of FinTech have been developed. Various payment methods were developed, and an authentication method was developed to improve the reliability of the payment. On the other hand, when mobile easy payment services are used, they have weak security because the authentication by phone number. Therefore, this paper proposes a technique for increasing the reliability of the authentication process using the unique device ID of the mobile device to improve the authentication process based on the telephone number. The core research contents are the architecture and process for the authentication of mobile payments based on the mobile device ID. The mobile payment architecture consists of a mobile device, authentication service, and mobile payment application. The mobile device consists of mobile device ID and phone number, and the authentication server consists of authentication module and encryption module. The mobile payment service consists of a pre-authentication module and decryption module. The process of mobile payment service is processed by the encrypted authentication information (device ID, phone number, and authentication number) among mobile devices, authentication server, and mobile payment application. The mobile device sends the telephone number and the device ID to the authentication server and the authentication server authenticates the user through an authentication process and encryption process. The mobile payment application performs the pre-authentication process by decrypting the received authentication number. This paper reports a difference that can prevent the risk of leakage of the authentication number in existing payment services through the authentication process of the authentication server and the pre-authentication process of the mobile payment service of this paper.

A Systematic Literature Review on SaaS: Identifying Research Trend in Korean Academia (SaaS관련 체계적인 연구문헌 분석: 국내 학술 경향 연구)

  • Lee, Hye-Jung;Lee, Jung-Woo;Cho, Cheul-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.6
    • /
    • pp.2729-2738
    • /
    • 2012
  • The purpose of this study is, to analyze the recent trend of studies on SaaS(Software as a Service) in Korea and to suggest a direction for the future research. For this purpose, the relevant literatures published in Korea Citation Index and literatures presented in conferences were gathered. Among these literatures, total of 39 samples were selected and used in the systematic literature review. The result shows that the application of SaaS in actual operations of industries are widely proliferated. However, the studies on SaaS generally lacks in its number and types. For example, studies so far are only on field of engineering and technology. Considering the fact that SaaS is moving towards the service orientation, studies on SaaS should develop in the fields of policy, business, individual and society sides of studies. In addition, the existing studies uses different concepts of relations between SaaS and ASP(Application Service Provider), as well as, different definitions of SaaS. Lastly, our research analyzed the problems of utilization of SaaS and found that, the quality, performance and security are presented as the core of the problems.

Pull-out Test of Steel Pipe Pile Reinforced with Hollow Steel Plate Shear Connectors (유공강판 전단연결재로 보강된 강관말뚝 머리의 인발실험)

  • Lee, Kyoung-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.285-291
    • /
    • 2016
  • The purpose of this study was to evaluate the structural capacity of steel pipe pile specimens reinforced with hollow steel plate shear connectors by pull-out test. Compressive strength testing of concrete was conducted and yield forces, tensile strengths and elongation ratios of re-bars and hollow steel plate were investigated. A 2,000kN capacity UTM was used for the pull-out test with 0.01mm/sec velocity by displacement control method. Strain gauges were installed at the center of re-bars and hollow steel plates and LVDTs were also installed to measure the relative displacement between the loading plate and in-filled concrete pile specimens. The yield forces of the steel pipe pile specimens reinforced with hollow steel plate shear connectors were increased 1.44-fold and 1.53-fold compared to that of a control specimen, respectively. Limited state forces of steel pipe pile specimens reinforced with hollow steel plate shear connectors were increased 1.23-fold and 1.29-fold compared to that of a control specimen, respectively. Yield state displacement and limited state displacement of steel pipe pile specimens reinforced with hollow steel plate shear connector were decreased 0.61-fold and 0.42-fold compared to that of a control specimen, respectively.

Design and Implementation of Factory Equipment Monitoring System using Grid-based Key Pre-Distribution (그리드 기반 키 선분배 방식을 사용하는 공장 설비 모니터링 시스템 설계 및 구현)

  • CHO, YANGHUI;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.51-56
    • /
    • 2016
  • In this paper, we propose an Arduino-based plant monitoring system. The proposed system is based on the Arduino platform, using an environmental sensor and a pressure sensor for measuring temperature, humidity and illuminance in order to monitor the state of the environment and the facilities of the plant. Monitoring data are transmitted to a ZigBee coordinator connected to a server through a radio frequency transceiver. When using a pressure sensor and the environment sensor data stored on the host server, checking the pressure in the environment of the plant and equipment is intended to report any alarm status to the administrator. Using a grid line-based key distribution scheme, the authentication node dynamically generates a data key to protect the monitoring information. Applying a ZigBee wireless sensor network does not require additional wiring for the actual implementation of a plant monitoring system. Possible working-environment monitoring of an efficient plant can help analyze the cause of any failure by backtracking the working environment when a failure occurs. In addition, it is easy to expand or add a sensor function using the Arduino platform and an expansion board.

Economic Inequality in Perceived Oral Health Behavior among Adults in Korea (한국 성인의 경제적 불평등에 따른 구강건강행태)

  • Kim, Mi-Jeong;Lim, Cha-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.439-445
    • /
    • 2018
  • This study was conducted to investigate the status of oral health behavior according to economic inequality in Korea. Raw data for the 3rd year (2015) of the 6th national health and nutrition survey were analyzed. Among surveyed individuals, adults over the age of 19 were designated as research subjects. The results indicated that a smaller 'house income' was associated with a higher supply and demand experience for basic living and a higher DMFT. Additionally, a higher DMFT was associated with a lower 'house income', lower 'education level', and the 'experience of basic living security received'. Oral health behavior inequality was caused by economic inequality. Overall, these results indicate that it is necessary for the oral health service of vulnerable groups to strengthen preventive activities through comprehensive arbitration policies regarding the social decision factors of public health projects.

Analysis of Educational Needs for Career Anchor and Career Development of Nursing Students (간호대학생의 커리어앵커와 경력개발을 위한 교육요구 분석)

  • Lee, Ji-An;Park, Su-Hong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.293-300
    • /
    • 2018
  • The purpose of this study is to investigate the educational needs for career development according to the job type of nursing college students. In order to achieve the purpose of the study, 146 nursing college students from K and P universities in the Busan and Kyungnam areas were analyzed using a career anchor questionnaire. In addition, 28 nursing college students who showed a higher level of tendency among job types were selected and divided into 4 teams, and a focus group interview was conducted based on the contents of the created map. Its purpose is to investigate the educational needs of nursing college students to enhance their career development. First, the career anchor types of the nursing college students showed the highest score in the areas of lifestyle, security and stability, while the lowest types of career anchor were pure challenge and general managerial competence. Second, the educational needs for career development were categorized into four areas, namely major competence, practical competence, personality competence, and resource management competence. The major competences are nursing expertise and skills. The practical competences consisted of ward task management, communication, crisis coping ability and personality competence and these were divided into cooperation and responsibility recognition. The resource management competence consists of time management ability and stress management ability. The results of this study are meaningful in that they can be used as the basic educational data for the career development of nursing college students in the future. In addition, it is expected that they can be applied to the development of a curriculum for the improvement of nursing practice.

Development of Water Hammer Simulation Model for Safety Assessment of Hydroelectric Power Plant (수력발전설비의 안전도 평가를 위한 수충격 해석 모형 개발)

  • Nam, Myeong Jun;Lee, Jae-Young;Jung, Woo-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.760-767
    • /
    • 2020
  • Sustainable growth of hydroelectric power plants is expected in consideration of climate change and energy security. However, hydroelectric power plants always have a risk of water hammer damage, and safety assurance is very important. The water hammer phenomenon commonly occurs during operations such as rapid opening and closing of the valves and pump/turbine shutdown in pipe systems, which is more common in cases of emergency shutdown. In this study, a computational numerical model was developed using the MOC-FDM scheme to reflect the mechanism of water hammer occurrence. The proposed model was implemented in boundary conditions such as reservoir, pipeline, valve, and pump/turbine conditions and then applied to simulate hypothetical case studies. The analysis results of the model were verified using the analysis results at the main points of the pipe systems. The model produced reasonably good performance and was validated by comparison with the results of the SIMSEN package model. The model could be used as an efficient tool for the safety assessment of hydroelectric power plants based on accurate prediction of transient behavior in the operation of hydropower facilities.

A Static and Dynamic Design Technique of Smart Contract based on Block Chain (블록체인 기반의 스마트 컨트랙트 정적/동적 설계 기법)

  • Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.6
    • /
    • pp.110-119
    • /
    • 2018
  • Blockchain technology has been highly evaluated for its contracts (contracts for sale, real estate contracts) because of its excellent security, including integrity and non-repudiation. In a blockchain, these contract services can be developed using a technology called a smart contract, and several blockchain platforms provide a programming language for developing smart contracts. Bitcoin and Ethereum, typical blockchain platforms, provide the Bitcoin Scripts and Solidity languages. Using these programming languages, we can develop the smart contract, a digital contract that can be processed dynamically. Smart contracts are being developed in a variety of areas, but studies of designs based on a blockchain are insufficient. In this paper, we propose a meta-model and a static/dynamic design method based on Unified Modeling Language (UML) for smart contracts based on Ethereum. We propose a method for static design attributes and functions of smart contracts, and propose a technique for designing structures among contracts. Dynamic design proposes a technique for designing deployment, function calls, and synchronization among smart contracts, accounts, and blocks within a blockchain. Experiments verify the validity of the design method by applying the static/dynamic design method through real estate contracts.

Relationship-type R&D Portfolio Method for Selection of Core Technology (중점기술 선정을 위한 관계분석형 R&D 포트폴리오 방법)

  • Gam, Hyemi;Seo, Min Woo;Kim, Chansoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.6
    • /
    • pp.677-682
    • /
    • 2018
  • The relationship-type research and development (R&D) portfolio is a method for selecting core technologies based on their unique purposes and characteristics when the criteria for selecting them are independent. This study presents a relationship-type R&D portfolio method as a way to derive core technologies, and describes the methodology by dividing it into three steps: 1) analyze the relationships between selection criteria and analytical indicators, 2) form a portfolio matrix that best matches each selection criteria, and 3) derive the core technologies. In this study, the relationships between four selection criteria for selecting core technologies and the analytical indicators for identifying the technology level, economics, and the technology itself, are written in a table with HoQ. Based on the relationship table, analytical indicators to be considered were derived to satisfy each selection criterion, and the derived analytical indicators and the selected technologies were constructed with two axes in the portfolio matrix. The satisfied portfolio, P0, that satisfies all four criteria, and the portfolio, P1~P4, that satisfies selection criteria based on the unique characteristics of the four criteria, were constructed, and core technologies derived. The selected core technologies can be utilized in selecting a core area against the future security environment through a process like key word analysis based on the specifications.