• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.035 seconds

Expert System-based Context Awareness for Edge Computing in IoT Environment (IoT 환경에서 Edge Computing을 위한 전문가 시스템 기반 상황 인식)

  • Song, Junseok;Lee, Byungjun;Kim, Kyung Tae;Youn, Hee Yong
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.21-30
    • /
    • 2017
  • IoT(Internet of Things) can enable networking and computing using any devices is rapidly proliferated. In the existing IoT environment, bottlenecks and service delays can occur because it processes data and provides services to users using central processing based on Cloud. For this reason, Edge Computing processes data directly in IoT nodes and networks to provide the services to the users has attracted attention. Also, numerous researchers have been attracted to intelligent service efficiently based on Edge Computing. In this paper, expert system-based context awareness scheme for Edge Computing in IoT environment is proposed. The proposed scheme can provide customized services to the users using context awareness and process data in real-time using the expert system based on efficient cooperations of resource limited IoT nodes. The context awareness services can be modified by the users according to the usage purpose. The three service modes in the security system based on smart home are used to test the proposed scheme and the stability of the proposed scheme is proven by a comparison of the resource consumptions of the servers between the proposed scheme and the PC-based expert system.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.

Personalized Recommendation System for IPTV using Ontology and K-medoids (IPTV환경에서 온톨로지와 k-medoids기법을 이용한 개인화 시스템)

  • Yun, Byeong-Dae;Kim, Jong-Woo;Cho, Yong-Seok;Kang, Sang-Gil
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.3
    • /
    • pp.147-161
    • /
    • 2010
  • As broadcasting and communication are converged recently, communication is jointed to TV. TV viewing has brought about many changes. The IPTV (Internet Protocol Television) provides information service, movie contents, broadcast, etc. through internet with live programs + VOD (Video on demand) jointed. Using communication network, it becomes an issue of new business. In addition, new technical issues have been created by imaging technology for the service, networking technology without video cuts, security technologies to protect copyright, etc. Through this IPTV network, users can watch their desired programs when they want. However, IPTV has difficulties in search approach, menu approach, or finding programs. Menu approach spends a lot of time in approaching programs desired. Search approach can't be found when title, genre, name of actors, etc. are not known. In addition, inserting letters through remote control have problems. However, the bigger problem is that many times users are not usually ware of the services they use. Thus, to resolve difficulties when selecting VOD service in IPTV, a personalized service is recommended, which enhance users' satisfaction and use your time, efficiently. This paper provides appropriate programs which are fit to individuals not to save time in order to solve IPTV's shortcomings through filtering and recommendation-related system. The proposed recommendation system collects TV program information, the user's preferred program genres and detailed genre, channel, watching program, and information on viewing time based on individual records of watching IPTV. To look for these kinds of similarities, similarities can be compared by using ontology for TV programs. The reason to use these is because the distance of program can be measured by the similarity comparison. TV program ontology we are using is one extracted from TV-Anytime metadata which represents semantic nature. Also, ontology expresses the contents and features in figures. Through world net, vocabulary similarity is determined. All the words described on the programs are expanded into upper and lower classes for word similarity decision. The average of described key words was measured. The criterion of distance calculated ties similar programs through K-medoids dividing method. K-medoids dividing method is a dividing way to divide classified groups into ones with similar characteristics. This K-medoids method sets K-unit representative objects. Here, distance from representative object sets temporary distance and colonize it. Through algorithm, when the initial n-unit objects are tried to be divided into K-units. The optimal object must be found through repeated trials after selecting representative object temporarily. Through this course, similar programs must be colonized. Selecting programs through group analysis, weight should be given to the recommendation. The way to provide weight with recommendation is as the follows. When each group recommends programs, similar programs near representative objects will be recommended to users. The formula to calculate the distance is same as measure similar distance. It will be a basic figure which determines the rankings of recommended programs. Weight is used to calculate the number of watching lists. As the more programs are, the higher weight will be loaded. This is defined as cluster weight. Through this, sub-TV programs which are representative of the groups must be selected. The final TV programs ranks must be determined. However, the group-representative TV programs include errors. Therefore, weights must be added to TV program viewing preference. They must determine the finalranks.Based on this, our customers prefer proposed to recommend contents. So, based on the proposed method this paper suggested, experiment was carried out in controlled environment. Through experiment, the superiority of the proposed method is shown, compared to existing ways.

An Analysis of IT Trends Using Tweet Data (트윗 데이터를 활용한 IT 트렌드 분석)

  • Yi, Jin Baek;Lee, Choong Kwon;Cha, Kyung Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.143-159
    • /
    • 2015
  • Predicting IT trends has been a long and important subject for information systems research. IT trend prediction makes it possible to acknowledge emerging eras of innovation and allocate budgets to prepare against rapidly changing technological trends. Towards the end of each year, various domestic and global organizations predict and announce IT trends for the following year. For example, Gartner Predicts 10 top IT trend during the next year, and these predictions affect IT and industry leaders and organization's basic assumptions about technology and the future of IT, but the accuracy of these reports are difficult to verify. Social media data can be useful tool to verify the accuracy. As social media services have gained in popularity, it is used in a variety of ways, from posting about personal daily life to keeping up to date with news and trends. In the recent years, rates of social media activity in Korea have reached unprecedented levels. Hundreds of millions of users now participate in online social networks and communicate with colleague and friends their opinions and thoughts. In particular, Twitter is currently the major micro blog service, it has an important function named 'tweets' which is to report their current thoughts and actions, comments on news and engage in discussions. For an analysis on IT trends, we chose Tweet data because not only it produces massive unstructured textual data in real time but also it serves as an influential channel for opinion leading on technology. Previous studies found that the tweet data provides useful information and detects the trend of society effectively, these studies also identifies that Twitter can track the issue faster than the other media, newspapers. Therefore, this study investigates how frequently the predicted IT trends for the following year announced by public organizations are mentioned on social network services like Twitter. IT trend predictions for 2013, announced near the end of 2012 from two domestic organizations, the National IT Industry Promotion Agency (NIPA) and the National Information Society Agency (NIA), were used as a basis for this research. The present study analyzes the Twitter data generated from Seoul (Korea) compared with the predictions of the two organizations to analyze the differences. Thus, Twitter data analysis requires various natural language processing techniques, including the removal of stop words, and noun extraction for processing various unrefined forms of unstructured data. To overcome these challenges, we used SAS IRS (Information Retrieval Studio) developed by SAS to capture the trend in real-time processing big stream datasets of Twitter. The system offers a framework for crawling, normalizing, analyzing, indexing and searching tweet data. As a result, we have crawled the entire Twitter sphere in Seoul area and obtained 21,589 tweets in 2013 to review how frequently the IT trend topics announced by the two organizations were mentioned by the people in Seoul. The results shows that most IT trend predicted by NIPA and NIA were all frequently mentioned in Twitter except some topics such as 'new types of security threat', 'green IT', 'next generation semiconductor' since these topics non generalized compound words so they can be mentioned in Twitter with other words. To answer whether the IT trend tweets from Korea is related to the following year's IT trends in real world, we compared Twitter's trending topics with those in Nara Market, Korea's online e-Procurement system which is a nationwide web-based procurement system, dealing with whole procurement process of all public organizations in Korea. The correlation analysis show that Tweet frequencies on IT trending topics predicted by NIPA and NIA are significantly correlated with frequencies on IT topics mentioned in project announcements by Nara market in 2012 and 2013. The main contribution of our research can be found in the following aspects: i) the IT topic predictions announced by NIPA and NIA can provide an effective guideline to IT professionals and researchers in Korea who are looking for verified IT topic trends in the following topic, ii) researchers can use Twitter to get some useful ideas to detect and predict dynamic trends of technological and social issues.

Analysis of Factors for Korean Women's Cancer Screening through Hadoop-Based Public Medical Information Big Data Analysis (Hadoop기반의 공개의료정보 빅 데이터 분석을 통한 한국여성암 검진 요인분석 서비스)

  • Park, Min-hee;Cho, Young-bok;Kim, So Young;Park, Jong-bae;Park, Jong-hyock
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1277-1286
    • /
    • 2018
  • In this paper, we provide flexible scalability of computing resources in cloud environment and Apache Hadoop based cloud environment for analysis of public medical information big data. In fact, it includes the ability to quickly and flexibly extend storage, memory, and other resources in a situation where log data accumulates or grows over time. In addition, when real-time analysis of accumulated unstructured log data is required, the system adopts Hadoop-based analysis module to overcome the processing limit of existing analysis tools. Therefore, it provides a function to perform parallel distributed processing of a large amount of log data quickly and reliably. Perform frequency analysis and chi-square test for big data analysis. In addition, multivariate logistic regression analysis of significance level 0.05 and multivariate logistic regression analysis of meaningful variables (p<0.05) were performed. Multivariate logistic regression analysis was performed for each model 3.

A Study on Korea Coast Guard Intelligence Centered on legal and Institutional comparison to other organizations, domestic and international (해양경비안전본부 정보활동의 법적·제도적 측면의 문제점 분석 및 개선방안 연구)

  • Soon, Gil-Tae
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.85-116
    • /
    • 2015
  • Found in 23 Dec 1953 to cope with illegal fishing of foreign ships and coastal guard duty, Korea Coast Guard was re-organized as an office under Ministry of Public Safety since the outbreak of sinking of passenger ship "Sewolho". In the course of re-organization, intelligence and investigation duty were transferred to Police Department except "Cases happened on the sea". But the definition of intelligence duty is vague and there are lots of disputes over the jurisdiction and range of activities. With this situation in consideration, the object of this study is to analyse legal and institutional characteristic of KCG Intelligence, to compare them to that of Police Department, foreign agencies like Japan Coast Guard and US Coast Guard, to expose the limit and to suggest solution. To summarize the conclusion, firstly, in the legal side, there is no legal basis on intelligence in [The Government Organization Act], no regulation for mission, weak basis in application act. Secondly, in the institutional side, stated in the minor chapter of [The Government Organization Act], 'the cases happened on sea' is a quite vague definition, while guard, safety, maritime pollution duty falls under 'on the sea' category, intelligence fell to 'Cases happened on the sea' causing coast guard duty and intelligence have different range. In addition, reduced organization and it's manpower led to ineffective intelligence activities. In the case of Police Department, there is definite lines on 'administration concerning public security' in [The Government Organization Act], specified the range of intelligence activities as 'collect, make and distribute information concerning public security' which made the range of main duty and intelligence identical. Japanese and US coast guards also have intelligence branch and performing activities appropriate for the main missions of the organizations. To have superiority in the regional sea, neighboring countries Japan and China are strengthening on maritime power, China has launched new coast guard bureau, Japan has given the coast guard officers to have police authority in the regional islands, and to support the objectives, specialized intelligence is organized and under development. To secure maritime sovereignty and enhance mission capability in maritime safety duty, it is strongly recommended that the KCG intelligence should have concrete legal basis, strengthen the organization and mission, reinforce manpower, and ensure specialized training administrative system.

  • PDF

Private Income Transfers and Old-Age Income Security (사적소득이전과 노후소득보장)

  • Kim, Hisam
    • KDI Journal of Economic Policy
    • /
    • v.30 no.1
    • /
    • pp.71-130
    • /
    • 2008
  • Using data from the Korean Labor & Income Panel Study (KLIPS), this study investigates private income transfers in Korea, where adult children have undertaken the most responsibility of supporting their elderly parents without well-established social safety net for the elderly. According to the KLIPS data, three out of five households provided some type of support for their aged parents and two out of five households of the elderly received financial support from their adult children on a regular base. However, the private income transfers in Korea are not enough to alleviate the impact of the fall in the earned income of those who retired and are approaching an age of needing financial assistance from external source. The monthly income of those at least the age of 75, even with the earning of their spouses, is below the staggering amount of 450,000 won, which indicates that the elderly in Korea are at high risk of poverty. In order to analyze microeconomic factors affecting the private income transfers to the elderly parents, the following three samples extracted from the KLIPS data are used: a sample of respondents of age 50 or older with detailed information on their financial status; a five-year household panel sample in which their unobserved family-specific and time-invariant characteristics can be controlled by the fixed-effects model; and a sample of the younger split-off household in which characteristics of both the elderly household and their adult children household can be controlled simultaneously. The results of estimating private income transfer models using these samples can be summarized as follows. First, the dominant motive lies on the children-to-parent altruistic relationship. Additionally, another is based on exchange motive, which is paid to the elderly parents who take care of their grandchildren. Second, the amount of private income transfers has negative correlation with the income of the elderly parents, while being positively correlated with the income of the adult children. However, its income elasticity is not that high. Third, the amount of private income transfers shows a pattern of reaching the highest level when the elderly parents are in the age of 75 years old, following a decreasing pattern thereafter. Fourth, public assistance, such as the National Basic Livelihood Security benefit, appears to crowd out private transfers. Private transfers have fared better than public transfers in alleviating elderly poverty, but the role of public transfers has been increasing rapidly since the welfare expansion after the financial crisis in the late 1990s, so that one of four elderly people depends on public transfers as their main income source in 2003. As of the same year, however, there existed and occupied 12% of the elderly households those who seemed eligible for the National Basic Livelihood benefit but did not receive any public assistance. To remove elderly poverty, government may need to improve welfare delivery system as well as to increase welfare budget for the poor. In the face of persistent elderly poverty and increasing demand for public support for the elderly, which will lead to increasing government debt, welfare policy needs targeting toward the neediest rather than expanding universal benefits that have less effect of income redistribution and heavier cost. Identifying every disadvantaged elderly in dire need for economic support and providing them with the basic livelihood security would be the most important and imminent responsibility that we all should assume to prepare for the growing aged population, and this also should accompany measures to utilize the elderly workforce with enough capability and strong will to work.

Structural Relationships Among Factors to Adoption of Telehealth Service (원격의료서비스 수용요인의 구조적 관계 실증연구)

  • Kim, Sung-Soo;Ryu, See-Won
    • Asia pacific journal of information systems
    • /
    • v.21 no.3
    • /
    • pp.71-96
    • /
    • 2011
  • Within the traditional medical delivery system, patients residing in medically vulnerable areas, those with body movement difficulties, and nursing facility residents have had limited access to good healthcare services. However, Information and Communication Technology (ICT) provides us with a convenient and useful means of overcoming distance and time constraints. ICT is integrated with biomedical science and technology in a way that offers a new high-quality medical service. As a result, rapid technological advancement is expected to play a pivotal role bringing about innovation in a wide range of medical service areas, such as medical management, testing, diagnosis, and treatment; offering new and improved healthcare services; and effecting dramatic changes in current medical services. The increase in aging population and chronic diseases has caused an increase in medical expenses. In response to the increasing demand for efficient healthcare services, a telehealth service based on ICT is being emphasized on a global level. Telehealth services have been implemented especially in pilot projects and system development and technological research. With the service about to be implemented in earnest, it is necessary to study its overall acceptance by consumers, which is expected to contribute to the development and activation of a variety of services. In this sense, the study aims at positively examining the structural relationship among the acceptance factors for telehealth services based on the Technology Acceptance Model (TAM). Data were collected by showing audiovisual material on telehealth services to online panels and requesting them to respond to a structured questionnaire sheet, which is known as the information acceleration method. Among the 1,165 adult respondents, 608 valid samples were finally chosen, while the remaining were excluded because of incomplete answers or allotted time overrun. In order to test the reliability and validity of the assessment scale items, we carried out reliability and factor analyses, and in order to explore the causal relation among potential variables, we conducted a structural equation modeling analysis using AMOS 7.0 and SPSS 17.0. The research outcomes are as follows. First, service quality, innovativeness of medical technology, and social influence were shown to affect perceived ease of use and perceived usefulness of the telehealth service, which was statistically significant, and the two factors had a positive impact on willingness to accept the telehealth service. In addition, social influence had a direct, significant effect on intention to use, which is paralleled by the TAM used in previous research on technology acceptance. This shows that the research model proposed in the study effectively explains the acceptance of the telehealth service. Second, the research model reveals that information privacy concerns had a insignificant impact on perceived ease of use of the telehealth service. From this, it can be gathered that the concerns over information protection and security are reduced further due to advancements in information technology compared to the initial period in the information technology industry, and thus the improvement in quality of medical services appeared to ensure that information privacy concerns did not act as a prohibiting factor in the acceptance of the telehealth service. Thus, if other factors have an enormous impact on ease of use and usefulness, concerns over these results in the initial period of technology acceptance may become irrelevant. However, it is clear that users' information privacy concerns, as other studies have revealed, is a major factor affecting technology acceptance. Thus, caution must be exercised while interpreting the result, and further study is required on the issue. Numerous information technologies with outstanding performance and innovativeness often attract few consumers. A revised bill for those urgently in need of telehealth services is about to be approved in the national assembly. As telemedicine is implemented between doctors and patients, a wide range of systems that will improve the quality of healthcare services will be designed. In this sense, the study on the consumer acceptance of telehealth services is meaningful and offers strong academic evidence. Based on the implications, it can be expected to contribute to the activation of telehealth services. Further study is needed to assess the acceptance factors for telehealth services, such as motivation to remain healthy, health care involvement, knowledge on health, and control of health-related behavior, in order to develop unique services according to the categorization of customers based on health factors. In addition, further study may focus on various theoretical cognitive behavior models other than the TAM, such as the health belief model.

Effects of Interference Signals on the Performance of EFTS (간섭신호가 EFTS의 성능에 미치는 영향)

  • Kang, Sanggee
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.3
    • /
    • pp.1-4
    • /
    • 2014
  • A radio communication system has interference caused by other radio transmitters operated in co-channel or adjacent channels. Therefore technical specifications are made by considering and investigating the effects of interference between the new system and present systems when the new system will be started to serve in the near future. FTS is used for preventing an abnormal mission and guaranteeing public protection. Recently the next generation FTS's are researched to reinforce the security and to increase the operating capability of simultaneous use. EFTS known as one of the next generation FTS's is suitable for such purposes. In this paper the effects of interference signals on the performance of EFTS are investigated. Noncoherent DPSK and noncoherent CPFSK are considered for the modulation method of EFTS and a FMCW and a pulse RADAR considered as a interferer. The power of FMCW is 20.3dB lower than the power of EFTS and the power of pulse RADAR is 19.1dB lower than that of EFTS. Simulation results show that FMCW interferer reduce $E_b/N_o$ of about 1dB and $E_b/N_o$ of EFTS deteriorates about 0.5dB due to interference signals generated from pulse RADAR.

A Study of China's Condition as the Logistics Hub of Northeast Asia and a Development Strategy (중국의 동북아 물류중심화 현황과 발전전략에 관한 연구)

  • Oh, Moon-Kap
    • Journal of Distribution Science
    • /
    • v.12 no.2
    • /
    • pp.95-103
    • /
    • 2014
  • Purpose - Korea has a better geographical location than other nations in the Northeast Asian region. This means that Korea has an opportunity to become the center of international physical distribution in Northeast Asia. Korea should take advantage of this opportunity by exploring appropriate strategies to achieve this goal, assuming government willingness, with a view to capitalizing on the geographical advantage of the Korean peninsula and constructing a comprehensive physical distribution network system. If we prepare for this scenario, Korea could become the center of international physical distribution in Northeast Asia. Research design, data, and methodology - This study has the purpose of determining how shipping companies form partnerships with third-party logistics providers, and the relevant implications. The survey methods used were personal interview and a questionnaire distributed through e-mail, fax, mail, and telephone. A total of 600 questionnaires were distributed, out of which 285 were returned. Of the collected questionnaires, 10 were excluded because of insufficient content, leaving 275 to be used in the study as available valid samples. The data that was collected from these samples was analyzed using the data coating process and by employing a statistical package program. Results - Flexible policies, administration, and systems will be needed to create better business practices. In this dissertation, first and foremost, the results reveal that in order to become the center of Northeast Asian logistics, Korea must transition into a new paradigm based on the current economic and social systems that have stemmed from bureaucracy, inflexibility, chauvinism, and egalitarianism. Flexible policies, administration, and systems will be required to create better business practices. Domestic logistics corporations need to occupy a strategic logistics hub, create a logistics network, and activate value-added logistics business strategies by ensuring significant manpower and by building a logistics information system to strengthen their competitive edge, creating an improved system. Conclusions - In this dissertation, first and foremost, we point out that in order to become a center of North East Logistics, Korea should change to a new paradigm from the old one based on current economic and social systems that have stemmed from bureaucracy, inflexibility, chauvinism, and egalitarianism. More reasonable business laws, systems, and policies based on market-driven flexibility and transparency should be created. Moreover, social norms and rules should be reasonably established, to accomplish political and social security. Korea has to cultivate a culture of tolerance for foreign companies. This involves a change of paradigm for the development of the capital city and satellite cities. It will take a powerful task force or organization to plan and execute the vision that aims to meet these needs, accomplish the necessary goals, use the appropriate system effectively, and make Korea a key country in the field of Northeast Asian logistics.