• Title/Summary/Keyword: risk communication

Search Result 1,219, Processing Time 0.027 seconds

The Study on Entrepreneurial Motivations and Maintenance Factors of Independent Publication (1인출판 창업 동기와 유지 요인에 관한 연구)

  • Cho, Jung-Mi;Kong, Byoung-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.4
    • /
    • pp.1541-1550
    • /
    • 2012
  • The study examines entrepreneurial motivation and maintenance factors of independent publication, a rising business in the current digital era. Focusing on a case of independent publication which has been successful, this research discloses that personal attributes and backgrounds of individuals are the main factors to motivate them to establish businesses. Personal attributes include desire for achievement, self-control, risk-taking inclination, and etc., and personal backgrounds contain educational background, work experiences in the same line of business, social network, and etc. Moreover, this research also discovers that both intrinsic reward indicating the belief that the individuals will be able to publish the books which they want, and extrinsic reward as market profits are the main maintenance factors. This case study will contribute to developing the education and consulting programs for independent publication entrepreneurship and the related policies.

A Atudy on NCS-based Virtual Training Content Analysis (NCS기반 가상훈련 콘텐츠 분석에 관한 연구)

  • Song, Eun-Jee;Lee, Seok-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.651-656
    • /
    • 2017
  • Virtual Training generates virtual situation or environment with specific goals in order to instruct trainees as if they are in the real-world. Recently, the demand of experiencing certain incident, which we are not able to experience in real life, has been increased along with the fast developing Virtual Reality (VR) technology. Particularly, Virtual Training(VT) enables us to learn various fields those require high risk and high cost. The system of VT provides interaction and allows us absorb these learning materials better which augments learning effect. Based on the demand of Virtual Training system, this research analyzes current education paradigm National Competency Standards (NCS) in Korea and suggests possible education that utilizes Virtual Training system. At the end of the day, our future goal is to apply suggested Virtual Training contents to universities that reflect NCS curriculum like polytechnic university.

The Development of Integrated Power Quality Diagnosis System for Power System (전력계통 전력품질 통합진단시스템 개발)

  • Kwak, N.H.;Jeon, Y.S.;Park, S.H.;Lee, I.M.;Park, H.C.
    • Proceedings of the KIEE Conference
    • /
    • 2005.07a
    • /
    • pp.277-279
    • /
    • 2005
  • Recently, due to the increase of power conversion devices and nonlinear loads with the development of information, communication and control technologies, the instantaneous minute interruption factors such as voltage & current harmonics, surge occurring frequency, instantaneous voltage variation, voltage unbalance, flicker etc. have greatly threatened the power quality, and the deterioration of electric power facilities and the functional error of controllers are increasing. As such an instantaneous minute interruption appears to be small and local, accurate evaluation with measurement is difficult and total analysis system is required through a wide range of power quality effect analysis such as the simultaneous measurement on various power supply phenomena and the analysis on the interrelation with system loads. Most of conventional power quality diagnosis equipments have beer developed and applied, which were able to measure the stability rate of frequency, the stability rate of voltage, the electricity-failure duration etc, However, they were insufficient to analyze the system present situation, understand the cause of the failure occurred by the problem of power quality and analyze out the phenomena. Accordingly, this study will address the development of the system for a wide range of power quality diagnosis over the present level, the system for supporting the determination such as the analysis on risk factors, failure mode and impact, the system for harmonic evaluation based on international standards(IEC 61000 Series) and the total power quality diagnosis network & system with the extension and openness as a local and national-scale broadband power quality diagnosis system.

  • PDF

A Study on the Aspects and Counter Systems of the Cyber Terrorism in the Era of Changing Information Circumstances (정보환경변화시대의 사이버테러 양상 및 대응체계에 관한 연구)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.237-260
    • /
    • 2005
  • Development of IT technology as well as arrival of information-oriented society raise the curtain of 'the era of Ubiquitous Computing', implying accessing computers beyond boundary of time and space. In this era, it is expected that IT paradigms and life-styles would be transformed immensely above the experiences of 20th century. However, improvement of technology summons a new risk of cyber terrorism which have not been in the past. Thus, it is urgent to prepare for the threats in the national level. This paper point out five major threats relating to 'the security in the era of Ubiquitous Computing'. : First, spread of threats in connection with BcN establishment, second, vulnerable information-security for wireless communication, third, leakage of private information, fourth, cyber terror and deterioration of security, fifth, security problems of Korea including the drain of military information and solutions in the views of organization, personnel, technology and budget, comparing with other countries.

  • PDF

Detection of Forgery of Mobile App and Study on Countermeasure (모바일 단말기 앱의 위·변조 탐지 및 대응방안 연구)

  • Jung, Hyun Soo;Chae, Gyoo-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2015
  • As the number of smartphone users is increasing with the development of mobile devices, the range of monetary transaction from the individual use is increasing. Therefore, hacking methods are diversified and the information forgery of mobile devices has been a current issue. The forgery via apps in mobile devices is a hacking method that creates an app similar to well-known apps to deceive the users. The forgery attack corresponds to the violation of integrity, one of three elements of security. Due to the forgery, the value and credibility of an app decreases with the risk increased. With the forgery in app, private information and data can be stolen and the financial losses can occur. This paper examined the forgery, and suggested a way to detect it, and sought the countermeasure to the forgery.

  • PDF

Analysis of the Collision Probability and Mission Environment for GEO (지구정지궤도위성 충돌확률 및 임무궤도 환경 분석)

  • Seong, Jae-Dong;Lee, Dae-Woo;Cho, Kyeum-Rae;Kim, Hae-Dong;Kim, Hak-Jung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.7
    • /
    • pp.674-681
    • /
    • 2011
  • The increasing number of orbital debris objects is a risk for satellite operations due to space activities over past 50 years since launched Sputnik. The GEO (Geostationary Earth Orbit), where COMS-1 is being operated since last June 2010, has more and more risks that collide with space debris or another satellites. In this paper, as a preliminary study about GEO satellite collision probability and operations environment, collision probability between COMS-1 and RADUGA 1-7 that is one of Russian military communication satellites is investigated and analyzed. Indeed, the space environment including space debris of COMS-1 is presented. As a result, it is noted that collision probability between two satellites using NORAD TLEs on 14th Jan. 2011 was 2.8753E-07 in case that position uncertainty was assumed 10km. Particularly, the largest proportion of space debris around COMS-1's mission orbit is meteoroids.

Development of Security Functional Requirements for Secure-Introduction of Unmanned Aerial Vehicle (무인항공기의 안전한 도입을 위한 보안기능요구사항 개발)

  • Kang, Dongwoo;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.97-105
    • /
    • 2019
  • With the possibility of wireless control of the aircraft by Nicola Tesla, Unmanned Aerial Vehicle(UAV) was mainly used for military and defense purposes with the rapid development through World War I and II. As civilian applications of unmanned aerial vehicles have expanded, they have been used with various services, and attempts have been made to control various environmental changes and risk factors of unmanned aerial vehicles. However, GPS spoofing, Jamming attack and security accidents are occurring due to the communication in the unmaned aerial vehicle system or the security vulnerability of the unmanned aerial vehicle itself. In order to secure introduction of Unmanned aerial vehicle, South Korea has established Unmanned Aerial Vehicle verification system called Airworthiness Certification. However, the existing cerfication system is more focused on test flight, design and structure's safety and reliability. In this paper, we propose a unmanned aerial vehicle system model and propose security functional requirements on unmanned aerial vehicle system in the corresponding system model for secure-introduction of Unmanned Aerial Vehicle. We suggest the development direction of verification technology. From this proposal, future development directions of evaluation and verification technology of Unmanned Aerial Vehicle will be presented.

Transcatheter Embolotherapy of Giant Pulmonary Arteriovenous Malformation Using Amplatzer® Vascular Plug (Amplatzer® 혈관폐색장치를 이용한 거대 폐동정맥기형 색전술 1예)

  • Jung, Ki Hwan;Lee, Seung Hwa;Shin, Chol;Kim, Je Hyeong
    • Tuberculosis and Respiratory Diseases
    • /
    • v.67 no.1
    • /
    • pp.52-58
    • /
    • 2009
  • Pulmonary arteriovenous malformation (PAVM) is a rare pulmonary vascular anomaly due to an abnormal communication between the pulmonary artery and vein. The most common presenting symptom is a dyspnea on exertion related to this right-to-left shunt. If left untreated, PAVM has been known to result in serious complications. Incomplete pulmonary capillary network can be the cause of cerebral abscesses and other noninfectious neurological complications, such as stroke and transient ischemic attacks due to paradoxic embolism Transcatheter embolotherapy, using coils or balloons, has replaced surgical resection as the treatment of choice for PAVM. However, the risk of device embolization has limited the use of coil embolotherapy, while the size of PAVM is huge. Recently, Amplatzer$^{(R)}$ Vascular Plug has been proposed as an alternative endovascular occlusion device for arteriovenous malformation. We report a case of 81-year-old male patient with a giant PAVM, which was successfully treated by transcatheter embolotherapy using the Amplatzer$^{(R)}$ Vascular Plug.

The Impact of Trust in Mobile Instant Messenger and Platform on Mobile Contents Purchase Intention: Focusing on Kakao Platform and KakaoTalk Emoticon (모바일 인스턴트 메신저 및 플랫폼 신뢰도가 모바일 콘텐츠 구매의도에 미치는 영향: 카카오플랫폼과 카카오톡 이모티콘을 중심으로)

  • Jung, Bohee;Kim, Hanku
    • The Journal of Information Systems
    • /
    • v.25 no.2
    • /
    • pp.131-152
    • /
    • 2016
  • Purpose Mobile phones increase the frequency and speed of communication. The most popular mobile application in Korea is KakaoTalk, one of the mobile instant messenger(MIM) services. Although studying mobile services such as SMS, SNS and SNG suggests drawing upon theories in marketing, consumer behavior, psychology to investigate their personal use, research on MIM is scarce. We designed this paper to fill this gap. More specifically, this study is focused on the relationships among consumers psychological variables related to purchase intention to emoticons in context of MIM. Design/methodology/approach Data was obtained from 310 KakaoTalk users in Korea via questionnaire. The data was analyzed by structural equation modeling in order to verify the relationship between variables in the model. Specifically, this study is designed to examine the structural relationships among perceived benefits, perceived risks, trust in messenger service, system quality, trust in platform, and emoticons purchase intention. Findings The findings of this study are as follow. First, perceived benefits and perceived risks had a significant impact on trust in MIM service(e.g. KakaoTalk). Specifically, while perceived benefits had a positive effect on trust in MIM service, perceived risks had a negative effect on trust in MIM service. Second, trust in messenger service also had a positive impact on system quality. Third, trust in messenger service and system quality had a positive effect on trust in platform(e.g. Kakao platform) directly. Lastly, trust in platform had a positive influence on emoticons purchase intention in KakaoTalk messenger.

A Study on Performance Evaluation and Security Methods of u-IT Electrical Safety Integrated Management System's Module (u-IT 전기안전통합관리시스템의 모듈별 성능평가와 보안방법 연구)

  • Park, Dae-Woo;Kim, Eung-Sik;Choi, Choung-Moon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1447-1452
    • /
    • 2010
  • Ubiquitous society to build basic infrastructure in the power supply and power equipment safety is important. u-City in order to prevent the disaster of u-IT Power Equipment Performance Module and the security for the safety of the u-City is necessary. In this paper, the power unit of u-IT module, temperature sensor, humidity sensor, equipped with sensors arranged throughout the fire, and home distribution boards, Home Network Wall-Pad, Blocker, MPNP black boxes, arc detection, arc safety equipment, outlet of the modular performance evaluation methods and security methods will be studied. u-IT power devices and sensors to analyze the information conveyed by proactive risk and ensure safety, access control, authentication, security safeguards, such as u-IT integrated management system for electrical safety and strengthen the security, safety and security with a u-City will contribute to the construction and operation.