• Title/Summary/Keyword: systems of action

Search Result 1,353, Processing Time 0.026 seconds

Legal Issues and Improvements surrounding the Arcade Game (아케이드게임을 둘러싼 법적문제와 개선방안)

  • Noh, Jae-Chul;Ko, Zoon-ki
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.3
    • /
    • pp.415-425
    • /
    • 2016
  • Game industry is certain to change rapidly as its attribute. Therefore, It's not easy that the law response to reflect the technological change of game industry properly, and a new legal issue that is difficult to cover with the existing law. Recently, Court battle or cases about games are socially receiving attention. Nevertheless, Research accumulation about the legal action to response this is rare situation. The legal system that is related games mostly approach in the regulation and punishment of one-sided administration so far. Relatively, Approach from the game industry development and promotion act standpoint is low. Shrinking rapidly the current game industry is not an irrelevance to this. So It is necessary to reconstruct rationally in side that embrace with variety of views of members of the society and interests about current game-related laws, systems and regulation instruments. Access to how will develop competitiveness of the game industry in legal aspects and how will promote the balanced development between game industries are needed. The problems that needs to handle in legal aspect such as game development, game distribution, and game usage which in the part of the game industry are getting more and more in the future. Therefore, there is a need to review consistently in the legal aspect for the game industry promotion.

Risks and Supervisory Challenges of Financial Conglomerates in Korea (금융그룹화와 금융위험: 실증분석 및 정책과제)

  • Hahm, Joon-Ho;Kim, Joon-Kyung
    • KDI Journal of Economic Policy
    • /
    • v.28 no.1
    • /
    • pp.145-191
    • /
    • 2006
  • This paper studies implications of financial conglomeration for both financial risk of individual conglomerates and systemic risk potential in post-crisis Korea. Our analyses suggest that we cannot conclude that financial conglomerates are taking on higher risks relative to non-conglomerate independent institutions. We also find that larger financial institutions show a significantly higher profitability and lower variability in profitability operating on a superior efficient frontier. However, it turns out that the consolidation has raised systemic risk potential as direct and indirect interdependencies among large banking institutions have substantially increased. Furthermore, financial conglomerates have become more vulnerable to contagion risks from non-bank sectors and capital markets. In the face of the shifting risk structure, financial supervisory and regulatory systems must be upgraded toward a more risk-based, consolidated supervision. Prompt corrective action provision for financial conglomerates must be based upon fully consolidated group risks, and effective supervisory devices need to be introduced to avoid inadvertent extension of public safety net to cross-sectoral activities of financial conglomerates. It is also critical to strengthen internal control and risk management capacities at financial conglomerates, and to establish strong market discipline by improving information transparency and monitoring incentives in the financial market.

  • PDF

Batching delivery for VCR-like functions in video-on-demand service system (주문형 비디오 서비스 시스템에서 VCR 기능을 위한 Batching 전송)

  • 박호균;유황빈
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.12
    • /
    • pp.2852-2859
    • /
    • 1997
  • Video-On-Demand system provides electronic video rental services from remote video servers on a broadband communication networks. Most of proposed VOD systems are typically designed for one-to-one conncetion between a user and video server. Therefore, video server stream services to customers individually by allocating a dedicated transmission channel and a set of video server resources for each customer. However, it is inefficiency and wxpensive way when server support multiple users who access the same video stream with a dedicated video channel. Therefore, to achieve cost-effectiveness, batching have studied method that uses multicast communication to simultaneously service all users requesting the same video with a single video with a single video stream. However, the application of the multicast communication by batching detract from the VCR-like function and on-demand nature of the system. In this paepr, we propose a scheme that can support an interactive VCR for all user requesting the same video stream with batching. To reduce a server I/O and network bandwidth requirement, dynamic buffer is allocated to access node which has variable playout poit. Consequently, it makes possible interactive VCR operation as if customer uses true VOD system. Also, this scheme can just deliver a multicast stream without delay after an initial request or VCR action occurred. The policy can guarantee acceptable services to number of users at minimum cost.

  • PDF

An Efficient Secure Routing Protocol Based on Token Escrow Tree for Wireless Ad Hoc Networks (무선 애드 혹 네트워크에서 보안성을 고려한 Token Escrow 트리 기반의 효율적인 라우팅 프로토콜)

  • Lee, Jae Sik;Kim, Sung Chun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.4
    • /
    • pp.155-162
    • /
    • 2013
  • Routing protocol in ad hoc mobile networking has been an active research area in recent years. However, the environments of ad hoc network tend to have vulnerable points from attacks, because ad hoc mobile network is a kind of wireless network without centralized authentication or fixed network infrastructure such as base stations. Also, existing routing protocols that are effective in a wired network become inapplicable in ad hoc mobile networks. To address these issues, several secure routing protocols have been proposed: SAODV and SRPTES. Even though our protocols are intensified security of networks than existing protocols, they can not deal fluidly with frequent changing of wireless environment. Moreover, demerits in energy efficiency are detected because they concentrated only safety routing. In this paper, we propose an energy efficient secure routing protocol for various ad hoc mobile environment. First of all, we provide that the nodes distribute security information to reliable nodes for secure routing. The nodes constitute tree-structured with around nodes for token escrow, this action will protect invasion of malicious node through hiding security information. Next, we propose multi-path routing based security level for protection from dropping attack of malicious node, then networks will prevent data from unexpected packet loss. As a result, this algorithm enhances packet delivery ratio in network environment which has some malicious nodes, and a life time of entire network is extended through consuming energy evenly.

Analysis of Survivability for Combatants during Offensive Operations at the Tactical Level (전술제대 공격작전간 전투원 생존성에 관한 연구)

  • Kim, Jaeoh;Cho, HyungJun;Kim, GakGyu
    • The Korean Journal of Applied Statistics
    • /
    • v.28 no.5
    • /
    • pp.921-932
    • /
    • 2015
  • This study analyzed military personnel survivability in regards to offensive operations according to the scientific military training data of a reinforced infantry battalion. Scientific battle training was conducted at the Korea Combat Training Center (KCTC) training facility and utilized scientific military training equipment that included MILES and the main exercise control system. The training audience freely engaged an OPFOR who is an expert at tactics and weapon systems. It provides a statistical analysis of data in regards to state-of-the-art military training because the scientific battle training system saves and utilizes all training zone data for analysis and after action review as well as offers training control during the training period. The methodologies used the Cox PH modeling (which does not require parametric distribution assumptions) and decision tree modeling for survival data such as CART, GUIDE, and CTREE for richer and easier interpretation. The variables that violate the PH assumption were stratified and analyzed. Since the Cox PH model result was not easy to interpret the period of service, additional interpretation was attempted through univariate local regression. CART, GUIDE, and CTREE formed different tree models which allow for various interpretations.

Analysis of Minimum Logistics Cost in SMEs using Korean-type CIPs Payment System (한국형 CIPs 결제 시스템을 이용한 중소기업의 최소 물류비용 분석)

  • Kim, Ilgoun;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.7-18
    • /
    • 2021
  • Recently, various connected industrial parks (CIPs) architectures using new technologies such as cloud computing, CPS, big data, fifth-generation mobile communication 5G, IIoT, VR-AR, and ventilation transportation AI algorithms have been proposed in Korea. Korea's small and medium-sized enterprises do not have the upper hand in technological competitiveness than overseas advanced countries such as the United States, Europe and Japan. For this reason, Korea's small and medium-sized enterprises have to invest a lot of money in technology research and development. As a latecomer, Korean SMEs need to improve their profitability in order to find sustainable growth potential. Financially, it is most efficient for small and medium-sized Korean companies to cut costs to increase their profitability. This paper made profitability improvement by reducing costs for small and medium-sized enterprises located in CIPs in Korea a major task. VJP (Vehicle Action Program) was noted as a way to reduce costs for small and medium-sized enterprises located in CIPs in Korea. The method of achieving minimum logistics costs for small businesses through the Korean CIPs payment system was analyzed. The details of the new Korean CIPs payment system were largely divided into four types: "Business", "Data", "Technique", and "Finance". Cost Benefit Analysis (CBA) was used as a performance analysis method for CIPs payment systems.

Technology Analysis on Automatic Detection and Defense of SW Vulnerabilities (SW 보안 취약점 자동 탐색 및 대응 기술 분석)

  • Oh, Sang-Hwan;Kim, Tae-Eun;Kim, HwanKuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.94-103
    • /
    • 2017
  • As automatic hacking tools and techniques have been improved, the number of new vulnerabilities has increased. The CVE registered from 2010 to 2015 numbered about 80,000, and it is expected that more vulnerabilities will be reported. In most cases, patching a vulnerability depends on the developers' capability, and most patching techniques are based on manual analysis, which requires nine months, on average. The techniques are composed of finding the vulnerability, conducting the analysis based on the source code, and writing new code for the patch. Zero-day is critical because the time gap between the first discovery and taking action is too long, as mentioned. To solve the problem, techniques for automatically detecting and analyzing software (SW) vulnerabilities have been proposed recently. Cyber Grand Challenge (CGC) held in 2016 was the first competition to create automatic defensive systems capable of reasoning over flaws in binary and formulating patches without experts' direct analysis. Darktrace and Cylance are similar projects for managing SW automatically with artificial intelligence and machine learning. Though many foreign commercial institutions and academies run their projects for automatic binary analysis, the domestic level of technology is much lower. This paper is to study developing automatic detection of SW vulnerabilities and defenses against them. We analyzed and compared relative works and tools as additional elements, and optimal techniques for automatic analysis are suggested.

Ad Planning Model by Comparison Challenge Approach in the e-Marketplace (e-Marketplace에서의 비교도전에 의한 광고계획 모델)

  • 이재규;이재원
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.137-153
    • /
    • 2003
  • Comparison shopping is the most popular functionality in the e-Marketplace. Most of their revenue has been generated kent the Internet advertisement, but the ad earning was declined as the ad costing per action method widespread. Seller less familiar to the customer shrinks from chances for advertising and exposing their products. So, we need an efficient methodology subject to the seller's ad budget and other constraints, and it also has to increase comparison broker's earning in the e-Marketplace. Our research proposed and developed an ad planning methodology using comparison challenge approach which can be applied by 3$^{rd}$ party comparison brokers. Comparison challenge planning is organized with challenge policy of competitor level, product level and specification level. With that policies and basic challenge propositions, we measure the quantified value of functional distance between the specifications of my product and competitor's product. My product challenges the comparison using the comparative ad format to the similar but inferior competitor's product based on quantified valuation. Comparison challenge planning system has two phases of comparative value generation and optimization. We developed a prototype system and applied it to the desktop PC market of five major manufacturers. Our performance was emphasized by comparing to other comparative ad methods such as random display method and minimum distance method..

  • PDF

Analysis report for readiness posture against north korea nuclear threat - Focused mainly in non-military area of government readiness posture - (북한의 핵위협 대비태세 분석 - 정부의 비군사분야 대비태세를 중심으로 -)

  • Kim, In-Tae
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.205-227
    • /
    • 2015
  • The Korean Peninsula is put in a position to carry out a highly strategic game vis-a-vis nK, which is asserting itself as a nuclear power amongst Northeast Asia's complex dynamics. While the international community recognizes nK's possession of nuclear weapons as released secret based on nK's three nuclear tests, shrewd strategic thinking is needed by ROK to secure itself as a non-nuclear nation in order to assume a responsible role to the international community, while simultaneously being ready to respond at all times for nK's military provocations. ROK must continue with its twofold strategy, by firm response to military confrontation with nK and maintaining flexible policy of tolerance in the areas of economy and ethnicity. Various strategic options to overcome nK's nuclear threats have been presented to ROK, whose possession of nuclear weapons have been difficult, and nK's nuclear capability is a real threat to ROK's national security. We must be able to respond to nK's nuclear threats strictly from ROK's national security perspective. This thesis aims to propose a response policy for nK's nuclear capability and nK's nuclear attack based on analysis of such nuclear damage, ROK Government's response posture against nK's nuclear threats, centered around ROK Government's non-military response posture.

  • PDF

A study on the policy of de-identifying unstructured data for the medical data industry (의료 데이터 산업을 위한 비정형 데이터 비식별화 정책에 관한 연구)

  • Sun-Jin Lee;Tae-Rim Park;So-Hui Kim;Young-Eun Oh;Il-Gu Lee
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.85-97
    • /
    • 2022
  • With the development of big data technology, data is rapidly entering a hyperconnected intelligent society that accelerates innovative growth in all industries. The convergence industry, which holds and utilizes various high-quality data, is becoming a new growth engine, and big data is fused to various traditional industries. In particular, in the medical field, structured data such as electronic medical record data and unstructured medical data such as CT and MRI are used together to increase the accuracy of disease prediction and diagnosis. Currently, the importance and size of unstructured data are increasing day by day in the medical industry, but conventional data security technologies and policies are structured data-oriented, and considerations for the security and utilization of unstructured data are insufficient. In order for medical treatment using big data to be activated in the future, data diversity and security must be internalized and organically linked at the stage of data construction, distribution, and utilization. In this paper, the current status of domestic and foreign data security systems and technologies is analyzed. After that, it is proposed to add unstructured data-centered de-identification technology to the guidelines for unstructured data and technology application cases in the industry so that unstructured data can be actively used in the medical field, and to establish standards for judging personal information for unstructured data. Furthermore, an object feature-based identification ID that can be used for unstructured data without infringing on personal information is proposed.