• Title/Summary/Keyword: information assets

Search Result 877, Processing Time 0.026 seconds

Analysis of the Landscape Conservation Direct Payment System Based on Spatial Information Data and Utilization of Rural Area Regeneration (공간정보데이터 기반의 경관보전직불제도 실태분석과 농촌공간 재생의 활용방안)

  • Kim, Young-Jin;Kang, Dong-Jin;Choi, Jin-ah;Son, Yong-hoon
    • Journal of Korean Society of Rural Planning
    • /
    • v.29 no.3
    • /
    • pp.39-52
    • /
    • 2023
  • There is a clear need to enhance the attractiveness of rural areas by leveraging their core assets to respond to emerging mega-trends. This paper analyzes the progress of the direct payment program that has been implemented to preserve agricultural landscapes in rural areas, using spatial information data. The study identified the planting characteristics of landscape crops, spatial utilization characteristics of the system, and utilization characteristics of the system by the beneficiaries. According to the analysis, the spatial utilization characteristics of the system could be classified into eight types: tourism resources and nearby agricultural areas, designation across the entire rural area, agricultural areas around villages, large-scale agricultural areas, small-scale agricultural areas, scattered and dispersed areas, independent parcels of land, and ranches. Based on the characteristics and limitations of the landscape preservation direct payment system, this study provides directions for future rural specialized zones. The landscape preservation direct payment system focuses on income support for farmers and providing agricultural benefits in terms of public interest. Meanwhile, the landscape agricultural zone serves as a rural specialized zone, highlighting the need to explore the direction of integrated rural landscape management. It is important for farmers, as the key stakeholders, to preserve the agricultural landscape in rural areas. Forming community-level cooperatives and engaging in relevant activities are crucial for achieving this goal. In order to actively preserve the agricultural landscape, it is necessary to consider the resumption of financial support for village landscape preservation activities, along with the designation of landscape agricultural zones. There is a need to conduct a specific review and explore measures to accommodate the designated landscape complexes at the local government level. The higher the ratio of designated landscape complexes, the more agricultural landscape management based on public value has been carried out. The designation of such landscape complexes can be seen as a demand for voluntary utilization of agricultural landscapes in the region. Moreover, as the ratio of designated landscape complexes increases, it becomes evident that farmers at the village level actively participate in agricultural landscape preservation and contribute to providing public value or utilize it as a tourism resource. This highlights the need for managing agricultural landscapes at the village level within the appropriate context.

NCS proposal for industrial security (산업보안 분야에 대한 NCS 제안)

  • Park, Jong-Chan;Ahn, Jung-Hyun;Choi, Young-Pyul;Lee, Seung-Hoon;Baik, Nam-Kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.358-360
    • /
    • 2022
  • Modern society is developing rapidly and technologies that provide convenience in living are developing day by day. On the other hand, the development of cyber attacks that threaten cybersecurity is developing faster, and it still adversely affects the industrial environment, and industrial damage is steadily occurring every year. Industrial security is an activity that safely protects major assets or technologies of companies and organizations from these attacks. Therefore, it is a situation that requires professional manpower for security. Currently, the manpower situation for security is staffed, but knowledge of the understanding and concept of industrial security jobs is insufficient. In other words, there is a lack of professional manpower for industrial security. It is the NCS that came out to solve this problem. NCS is the state standardized ability (knowledge, attitude, skills, etc.) necessary to perform duties in the industrial field. NCS can systematically design the curriculum using NCS as well as help in hiring personnel, and NCS can be applied to the national qualification system. However, in the field of industrial security, NCS has not yet been developed and is still having difficulties in hiring personnel and curriculum. Although the NCS system in the field of industrial security has not been developed, this paper proposes the industrial security NCS to solve the problem of hiring professionals later and to help the field of industrial security NCS to be established later.

  • PDF

The effects of knowledge management strategy on the management performance in the hotel industry (호텔기업의 지식경영전략이 경영성과에 미치는 영향)

  • Kim, Hyoung-Gu;Son, Jae-Young;SunWoo, Young-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.227-235
    • /
    • 2009
  • The ultimate goal of hotel corporations is to maintain their existence by securing competitive advantages over their competitors. In order to secure competitive advantages, they need to shed off the conventional paradigm of company management, which increasingly grows weaker as the industrial society turns into a knowledge-based one, and make effective use of knowledge, which is the core source of their wealth and competitiveness, in their management. Thus this study set out to identify knowledge management strategy to result in great management performance to hotel corporations. It also aimed to suggest specific action plans for them to do knowledge management efficiently based on the results. The causal relations between the knowledge management strategy and management performance were examined to figure out the former's influences on the latter. As a result, Two types of knowledge management strategy seemed to have positive(+) impacts on competitive advantages, but negative(-) impacts on financial performance.

Adaptive Power Saving Mechanism of Low Power Wake-up Receivers against Battery Draining Attack (배터리 소모 공격에 대응하는 저전력 웨이크업 리시버의 적응형 파워 세이빙 메커니즘)

  • So-Yeon Kim;Seong-Won Yoon;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.393-401
    • /
    • 2024
  • Recently, the Internet of Things (IoT) has been widely used in industries and daily life that directly affect human safety, life, and assets. However, IoT devices, which need to meet low-cost, lightweight, and low-power requirements, face a significant problem of shortened battery lifetime due to battery draining attacks and interference. To solve this problem, the 802.11ba standard for the Wake-up Receiver (WuR) has emerged, this feature is playing a crucial role in minimizing energy consumption. However, the WuR protocol did not consider security mechanisms in order to reduce latency and overhead. Therefore, in this study, anAdaptive Power Saving Mechanism (APSM) is proposed for low-power WuR to counter battery draining attacks. APSM can minimize abnormally occurring power consumption by exponentially increasing power-saving time in environments prone to attacks. According to experimental results, the proposed APSM improved energy consumption efficiency by a minimum of 13.77% compared to the traditional Legacy Power Saving Mechanism (LPSM) when attack traffic ratio is 10% or more of the total traffic.

An Analysis of Relationship between Social Sentiments and Cryptocurrency Price: An Econometric Analysis with Big Data (소셜 감성과 암호화폐 가격 간의 관계 분석: 빅데이터를 활용한 계량경제적 분석)

  • Sangyi Ryu;Jiyeon Hyun;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.21 no.1
    • /
    • pp.91-111
    • /
    • 2019
  • Around the end of 2017, the investment fever for cryptocurrencies-especially Bitcoin-has started all over the world. Especially, South Korea has been at the center of this phenomenon. Sinceit was difficult to find the profitable investment opportunities, people have started to see the cryptocurrency markets as an alternative investment objects. However, the cryptocurrency fever inSouth Korea is mostly based on psychological phenomenon due to expectation of short-term profits and social atmosphere rather than intrinsic value of the assets. Therefore, this study aimed to analyze influence of people's social sentiment on price movement of cryptocurrency. The data was collected for 181 days from Nov 1st, 2017 to Apr 30th, 2018, especially focusing on Bitcoin-related post in Twitter along with price of Bitcoin in Bithumb/UPbit. After the collected data was refined into neutral, positive and negative words through sentiment analysis, the refined neutral, positive, and negative words were put into regression model in order to find out the impacts of social sentiments on Bitcoin price. After examining the relationship by the regression analyses and Granger Causality tests, we found that the positive sentiments had a positive relationship with Bitcoin price, while the negative words had a negative relation with it. Also, the causality test results show that there exist two-way causalities between social sentiment and Bitcoin price movement. Therefore, we were able to conclude that the Bitcoin investors'behaviors are affected by the changes of social sentiments.

An Overview of Readjustment Measures Against the Banking Industry's Non-Performing Loans (은행부실채권(銀行不實債權) 정리방안(整理方案)에 대한 고찰(考察))

  • Kim, Joon-kyung
    • KDI Journal of Economic Policy
    • /
    • v.13 no.1
    • /
    • pp.35-63
    • /
    • 1991
  • Currently, Korea's banking industry holds a sizable amount of non-performing loans which stem from the government-led bailout of many troubled firms in the 1980s. Although this burden was somewhat relieved with the aid of banks' recapitalization in the booming securities market between 1986-88, the insolvent credits still resulted in low profitability in the banking sector and have been detrimental to the progress of financial liberalization and internationalization. This paper surveys the corporate bailout experiences of major advanced countries and Korea in the past and derives a rationale for readjustment measures against non-performing loans, in which rescue plans depend on the nature of the financial system. Considering the features of Korea's financial system and the banking sector's recent performance, it discusses possible means of liquidation in keeping with the rationale. The conflict of interests among parties involved in non-performing loans is widely known as one of the major constraints in writing off the loans. Specifically, in the case of Korea, the government's excessive intervention in allocating credits has preempted the legitimate role of the banking sector, which now only passively manages its past loans, and has implicitly confused private with public risk. This paper argues that to minimize the incidence of insolvent loan readjustment, the government's role should be reduced and that the correspondent banks should be more active in the liquidation process, through the market mechanism, reflecting their access to detailed information on the troubled firms. One solution is that banks, after classifying the insolvent loans by the lateness or possibility of repayment, would swap the relatively sound loans for preferred stock and gradually write off the bad ones by expanding the banks' retained earnings and revaluing the banks' assets. Specifically, the debt-equity swap can benefit both creditors and debtors in the sense that it raises the liquidity and profitability of bank assets and strengthens the debtor's financial structure by easing the debt service burden. Such a creditor-led or market-led solution improves the financial strength and autonomy of the banking sector, thereby fostering more efficient resource allocation and risk sharing.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Foreign Investors Response to the Foreign Exchange Rate Risk in the Korean Stock Markets (한국 주식시장에서 환위험에 대한 외국인 투자자의 반응)

  • Park, Jong-Won;Kwon, Taek-Ho;Lee, Woo-Baik
    • The Korean Journal of Financial Management
    • /
    • v.25 no.4
    • /
    • pp.53-78
    • /
    • 2008
  • Foreign investors who invest in the Korean stock markets are exposed to two kinds of foreign exchange rate risk, the economic exposure and the translation exposure. The former is the foreign exchange rate exposure in return generating process of the assets invested and the latter is the foreign exchange rate exposure in the translation of domestic return into foreign investors' currency. Domestic investors, however, are exposed only to foreign exchange rate exposure in the asset invested. This different situation on foreign exchange rate exposure between foreign investors and domestic investors can induce different response to exchange rate change by investor groups. Previous studies on foreign exchange rate exposure of Korean firms reported that quite a few Korean firms are exposed to foreign exchange risks and suggested to manage the foreign exchange risks. Also, many studies on the market segmentation showed that a market can be practically segmented according to the characteristics of investor groups. These studies support the hypothesis that the Korean stock market can be practically segmented by the foreign investors' attitude to the foreign exchange rate exposure. This study examines the response of both foreign investors and domestic investors to the foreign exchange rate exposures in Korean stock markets. Test results show that foreign investors increase their sell transactions when the foreign exchange rate exposure of the previous day is negative. This result can be possible when foreign investors attempt to actively manage the decrease in value of their assets due to rising of exchange rate. Analysis on the sell order data is also supportive to this interpretation. Foreign investors also increase their buy transactions when the foreign exchange rate exposure of the previous day is negative. This result can be possible when foreign investors use actively the relation between the increase in asset value and the translation gain due to declining of exchange rate. Analyses on buy order data, however, do not show the same result as the analyses on transaction data. This difference may come from the difference of information contained in transaction data and order data. In summary, the result of the paper supports the hypothesis that foreign investors response differently to foreign exchange rate exposure compared with domestic, Korean investors. Two groups do not show different response when exchange rate exposure is positive, i.e., as foreign exchange rate is increase (decrease), the asset value is increase (decrease). However, foreign investors' response is different from that of domestic investors when exchange rate exposure is negative, i.e., as foreign exchange rate is increase (decrease), the asset value is decrease (increase). These results mean that foreign investors and domestic investors are placed in different situations related to foreign exchange rate exposure, and these differences are reflected in the Korean stock markets. And domestic investors need to consider foreign investors' different attitude to the foreign exchange rate exposure when they analysis foreign investors' trading behavior.

  • PDF

A Study on the construction of physical security system by using security design (보안디자인을 활용한 시설보안시스템 구축 방안)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.129-159
    • /
    • 2011
  • Physical security has always been an extremely important facet within the security arena. A comprehensive security plan consists of three components of physical security, personal security and information security. These elements are interrelated and may exist in varying degrees defending on the type of enterprise or facility being protected. The physical security component of a comprehensive security program is usually composed of policies and procedures, personal, barriers, equipment and records. Human beings kept restless struggle to preserve their and tribal lives. However, humans in prehistoric ages did not learn how to build strong house and how to fortify their residence, so they relied on their protection to the nature and use caves as protection and refuge in cold days. Through the history of man, human has been establishing various protection methods to protect himself and his tribe's life and assets. Physical security methods are set in the base of these security methods. Those caves that primitive men resided was rounded with rock wall except entrance, so safety was guaranteed especially by protection for tribes in all directions. The Great Wall of China that is considered as the longest building in the history was built over one hundred years from about B.C. 400 to prevent the invasion of northern tribes, but this wall enhanced its protection function to small invasions only, and Mongolian army captured the most part of China across this wall by about 1200 A.D. European lords in the Middle Ages built a moat by digging around of castle or reinforced around of the castle by making bascule bridge, and provided these protections to the resident and received agricultural products cultivated. Edwin Holmes of USA in 20 centuries started to provide innovative electric alarm service to the development of the security industry in USA. This is the first of today's electrical security system, and with developments, the security system that combined various electrical security system to the relevant facilities takes charging most parts of today's security market. Like above, humankind established various protection methods to keep life in the beginning and its development continues. Today, modern people installed CCTV to the most facilities all over the country to cope with various social pathological phenomenon and to protect life and assets, so daily life of people are protected and observed. Most of these physical security systems are installed to guarantee our safety but we pay all expenses for these also. Therefore, establishing effective physical security system is very important and urgent problem. On this study, it is suggested methods of establishing effective physical security system by using system integration on the principle of security design about effective security system's effective establishing method of physical security system that is increasing rapidly by needs of modern society.

  • PDF

Multinational Enforcement of the Capital Markets Act - Focusing on the Anti-Fraud Regulation by the Public Regulators - (다국적 차원의 자본시장법규 집행 - 공적기관에 의한 불공정거래 규제를 중심으로 -)

  • Chang, Kun-Young
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.419-454
    • /
    • 2017
  • Faced with the internationalization of capital markets, Korea needs to protect its investors and markets by applying the relevant laws extraterritorially. The Financial Investment Services and Capital Markets Act ("Capital Markets Act") explicitly introduced a new provision recognizing the extraterritoriality of the Act. While Article 2 of the Capital Markets Act comprehensively provides for prescriptive extraterritorial jurisdiction, the enactment of extraterritoriality alone does not guarantee that the Act will apply to cross-border transactions effectively. The effective extraterritorial application of an act is inseparable from the adjudicative and enforcement jurisdiction of the act. Specifically, active investigations and detections by the public regulators might be the first step for enforcing the Capital Markets Act. Unlike domestic regulations, however, multinational enforcement actions outside a regulator's home country becomes more problematic because of various obstacles. This Article examines difficulties which domestic regulators may confront in enforcing the Capital Markets Act extraterritorially and makes several recommendations for more effective multinational enforcement as follows. First, the Korean regulators should continue to foster cooperation through the IOSCO and provide international markets with the information and tools necessary for successful regulation of cross-border transactions. Second, the principle of dual criminality should be applied in a modified form for the effective mutual legal assistance in criminal matters. Third, there should be a legal device for the domestic regulator to freeze foreign wrongdoer's assets located outside Korea to repatriate those assets for distribution to defrauded investors in Korea.