• Title/Summary/Keyword: 데이터 인증

Search Result 1,281, Processing Time 0.03 seconds

The Signaling Effect of Government R&D Subsidies on Inducing Venture Capital Funding (스타트업 대상 정부 R&D 지원금의 벤처 투자 유도 효과)

  • Hong, Seulki;Bae, Sung Joo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.6
    • /
    • pp.39-50
    • /
    • 2022
  • Based on the signaling theory, this study examined whether startups are more likely to attract venture investment when receiving government R&D subsidies. First, we reviewed previous studies of the investment decision-making process of venture capitalists and understood the conditions that influence investment decisions. Based on previous studies on the signal effect of government subsidies, particularly government R&D grants, on inducing private fund investment, this study revealed a mechanism to induce venture investment by startups. In addition, in order to verify whether government R&D subsidies have the effect of inducing venture investment, an empirical analysis was conducted based on data from startups under seven years and certified as a venture companies in 2021. This paper used PSM(Propensity Score Matching) method and DID(Difference In Difference) analysis for an empirical study to analyze the average treatment effect on the treated group(beneficiary startups of government R&D grants). As a result of empirical analysis, companies that receive more government R&D subsidies after starting a business are more likely to attract venture investment. From two to three years after conducting the first government R&D project, startups that received government R&D grants attracted more venture investment than those that did not. The results of this paper demonstrate that government R&D projects can also affect the venture investment ecosystem, giving policy implications to government R&D projects targeting startups. It is also expected to suggest strategic implications to startups that need new funding.

Information Security Job Skills Requirements: Text-mining to Compare Job Posting and NCS (정보보호 직무 수행을 위해 필요한 지식 및 기술: 텍스트 마이닝을 이용한 구인광고와 NCS의 비교)

  • Hyo-Jung Jun;Byeong-Jo Park;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.3
    • /
    • pp.179-197
    • /
    • 2023
  • As a sufficient workforce supports the industry's growth, workforce training has also been carried out as part of the industry promotion policy. However, the market still has a shortage of skilled mid-level workers. The information security disclosure requires organizations to secure personnel responsible for information security work. Still, the division between information technology work and job areas is unclear, and the pay is not high for responsibility. This paper compares job keywords in advertisements for the information security workforce for 2014, 2019, and 2022. There is no difference in the keywords describing the job duties of information security personnel in the three years, such as implementation, operation, technical support, network, and security solution. To identify the actual needs of companies, we also analyzed and compared the contents of job advertisements posted on online recruitment sites with information security sector knowledge and skills defined by the National Competence Standards used for comprehensive vocational training. It was found that technical skills such as technology development, network, and operating system are preferred in the actual workplace. In contrast, managerial skills such as the legal system and certification systems are prioritized in vocational training.

Investigation of the level difference of floor impact noises through the shape variation of EVA resilient materials with composite floor structure (EVA 완충재의 형상변환을 통한 복합구조의 바닥충격음 변이 조사)

  • Jakin Lee;Seung-Min Lee;Chan-Hoon Haan
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.1
    • /
    • pp.60-71
    • /
    • 2024
  • The present study aims to investigate the level difference of floor impact noises of composite floor structure using EVA resilient materials. In order to this, four different types of resilient materials were designed combining PET, PP sheet and EVA mount including Flat type, Deck type, Cavity type and Mount type. Totally 9 different samples were made for acoustic measurements which were carried out twice with bang-machine and impact ball as the heavy-weight floor impact noise sources. All the floor impact noise measurements were undertaken at the authentication institution. As a result, concerning Flat and Cavity types, it was found that 2 dB ~ 5 dB of heavy-weight floor impact noise was reduced supplementally when PET was added, while floor impact noise larger than 50 dB was acquired when single resilient material was used. Especially, most high performance was obtained for Mount type with 1st grade of light-weight floor impact noise and 2nd grade of heavy-weight floor impact noise. This is because of material property with low dense PET sound absorption materials which fill all around EVA mounts. Also, it was considered that this results are due to the sound impact absorption by the both EVA mounts and the air cavity between EVA mount and PP sheet. Also, it was found that at least 36 EVA mounts per 1m2 area of resilient panel make more noise reduction of heavy-weight floor impact noises.

Application of Westgard Multi-Rules for Improving Nuclear Medicine Blood Test Quality Control (핵의학 검체검사 정도관리의 개선을 위한 Westgard Multi-Rules의 적용)

  • Jung, Heung-Soo;Bae, Jin-Soo;Shin, Yong-Hwan;Kim, Ji-Young;Seok, Jae-Dong
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.16 no.1
    • /
    • pp.115-118
    • /
    • 2012
  • Purpose: The Levey-Jennings chart controlled measurement values that deviated from the tolerance value (mean ${\pm}2SD$ or ${\pm}3SD$). On the other hand, the upgraded Westgard Multi-Rules are actively recommended as a more efficient, specialized form of hospital certification in relation to Internal Quality Control. To apply Westgard Multi-Rules in quality control, credible quality control substance and target value are required. However, as physical examinations commonly use quality control substances provided within the test kit, there are many difficulties presented in the calculation of target value in relation to frequent changes in concentration value and insufficient credibility of quality control substance. This study attempts to improve the professionalism and credibility of quality control by applying Westgard Multi-Rules and calculating credible target value by using a commercialized quality control substance. Materials and Methods : This study used Immunoassay Plus Control Level 1, 2, 3 of Company B as the quality control substance of Total T3, which is the thyroid test implemented at the relevant hospital. Target value was established as the mean value of 295 cases collected for 1 month, excluding values that deviated from ${\pm}2SD$. The hospital quality control calculation program was used to enter target value. 12s, 22s, 13s, 2 of 32s, R4s, 41s, $10\bar{x}$, 7T of Westgard Multi-Rules were applied in the Total T3 experiment, which was conducted 194 times for 20 days in August. Based on the applied rules, this study classified data into random error and systemic error for analysis. Results: Quality control substances 1, 2, and 3 were each established as 84.2 ng/$dl$, 156.7 ng/$dl$, 242.4 ng/$dl$ for target values of Total T3, with the standard deviation established as 11.22 ng/$dl$, 14.52 ng/$dl$, 14.52 ng/$dl$ respectively. According to error type analysis achieved after applying Westgard Multi-Rules based on established target values, the following results were obtained for Random error, 12s was analyzed 48 times, 13s was analyzed 13 times, R4s was analyzed 6 times, for Systemic error, 22s was analyzed 10 times, 41s was analyzed 11 times, 2 of 32s was analyzed 17 times, $10\bar{x}$ was analyzed 10 times, and 7T was not applied. For uncontrollable Random error types, the entire experimental process was rechecked and greater emphasis was placed on re-testing. For controllable Systemic error types, this study searched the cause of error, recorded the relevant cause in the action form and reported the information to the Internal Quality Control committee if necessary. Conclusions : This study applied Westgard Multi-Rules by using commercialized substance as quality control substance and establishing target values. In result, precise analysis of Random error and Systemic error was achieved through the analysis of 12s, 22s, 13s, 2 of 32s, R4s, 41s, $10\bar{x}$, 7T rules. Furthermore, ideal quality control was achieved through analysis conducted on all data presented within the range of ${\pm}3SD$. In this regard, it can be said that the quality control method formed based on the systematic application of Westgard Multi-Rules is more effective than the Levey-Jennings chart and can maximize error detection.

  • PDF

Total Folate Contents of 15 Edible Plants Consumed in Korea Using Trienzyme Extraction Method (국내 소비되는 봄나물의 Trienzyme 추출법을 적용한 엽산 함량 분석)

  • Kim, Bo Min;Kim, So-Min;Oh, Ji Yeon;Cho, Young-Sook;Kim, Se-Na;Choi, Youngmin
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.43 no.11
    • /
    • pp.1796-1800
    • /
    • 2014
  • Trienzyme digestion (AOAC Official Method 2004.05) procedure using protease, ${\alpha}$-amylase, and chicken pancreas conjugase was evaluated to determine its usefulness in the microbiological quantitation of total folate in foods. Folate values obtained by alkali hydrolysis (Korean Food Standards Codex) were compared to those obtained by the trienzyme method for four certified reference materials (CRM) representing diverse matrixes. Trienzyme treatment increased measurable folate from most CRM compared to levels found after alkali hydrolysis. The largest increases were observed with CRM 487 (pig liver, 5.8-fold) and CRM 121 (whole meal flour, 3.1-fold) after trienzyme digestion. Using trienzyme digestion method, total folate contents of raw and blanched edible plants were determined. Eleutherococcus senticosus ($146.9{\mu}g/100g$) showed the highest total folate content, followed by Aster glehni F. Schmidt ($142.8{\mu}g/100g$) and Ledebouriella seseloides H. Wolff ($140.4{\mu}g/100g$) on a wet weight basis. Blanching of samples resulted in an insignificant decrease in folate content for five samples and 11~63% reduction for nine samples. Our finding suggests that trienzyme digestion method is accurate for the determination of food folate in leafy vegetables.

병원정보시스템 품질 항목에 대한 제안

  • Park, Chan-Seok;Go, Seok-Ha
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2007.05a
    • /
    • pp.300-320
    • /
    • 2007
  • 정보기술의 발달과 함께 소프트웨어 제품은 모든 산업에 필수요소가 되었고, 품질과 평가에 대한 관심도 점차 증가되고 있다. 하지만 일부 산업에서는 소프트웨어 품질 평가에 대한 사용자들의 만병 통치적 기대, 품질 표준의 부족, 측정을 위한 양질의 데이터 부족, 소프트웨어 분석과 디자인에 대한 공학적 한계로 소프트웨어 품질 평가에 대해 많은 문제점이 지적되고 있다. 국내에서도 의료산업 관련 정보시스템의 오류 및 사용자들의 운영 미숙은 매년 많은 금액의 사회적 비용을 증가시켰고, 병원정보시스템의 품질에 대한 관심을 초래하였다. 특히, 산업적 특성이 강한 병원정보시스템은 성공적 구축을 위해 사용자 중심의 소프트웨어 디자인과 다양한 전문가들의 지식 통합이 필요하며, 정보시스템 품질 측정으로 연구자들과 개발자들의 시스템 설계 혼란을 감소시키는 방법론이 필요하다는 연구들이 등장하고 있다. 대부분의 병원정보시스템이 단편적인 업무처리 위주로 개발 운영되고 있고, 장기적 경영전략이나 임상연구를 위한 분석적 정보처리 기능들은 결여되어 있다. 또한 소프트웨어 재설계나 추가적 개발 에 활용될 수 있는 객관적 품질 기준이 부족하고, 사용자들의 요구사항에 대해 소프트웨어 설계에 있어서 효율적으로 반영되지 못하고 있다. 이에 본 연구는 최근 발표된 병원정보시스템 품질 평가에 대한 연구 경향을 종합하고, 품질 평가에 대 해 효율적으로 활용되고 있는 사용성(Usability)을 기준으로 병원산업의 특수성을 포함한 품질 평가 방법과 품질척도를 제안하고자 한다. 국제표준기구(ISO:International Standards Organization)에서는 품질 특성을 기능성, 신뢰성, 사용성, 효율성, 유지 보수성과 이식성의 특성을 제시하고 있다. 특히 Folmer & Bosch(2004)가 정리한 ISO9126에서는 품질의 특성을 배움의 용이성, 운영의 용이성, 이해성과 매력성으로 분류하였고, ISO9241-11는 효과성, 효율성과 만족성으로 분류하였다. 또한 Shackel(1991)은 배움의 용이성(배움과 시간, 기억력), 효과성(오류, 직무시간), 유연성과 마음가짐으로 분류하고 있다(Shackel, 1991). Nielsen(1997)은 배움의 용이성, 기억의 용이성, 오류, 효율성, 만족성으로 분류하고 있고(Nielsen, 1997), Shneiderman(1998)는 효과성(직무시간, 배움의 시간), 효율성(기억의 지속시간, 오류), 만족도를 품질의 특성으로 분류하였다. 이와 같은 소프트웨어의 품질은 소프트웨어 계획, 개발, 성장과 쇠퇴의 모든 과정에 적용되며, 환경적 변화에 따라 사용자들의 정보욕구를 적절하게 반영하여 만족도를 높이 는 것이라고 요약할 수 있다. 그러나 현재까지 소프트웨어 품질 평가에 대한 연구들 은 보편적인 평가 항목들을 대상으로 측정하여 일반적인 품질기준을 제시하고 있고, 유사한 측정 내용들이 중복되어 있다. 이러한 경향은 산업별 특수성이 강한 소프트웨어에 대해서는 정확한 품질측정이 어려웠고, 품질측정에 대한 신뢰성을 떨어뜨리는 계기가 되었다. 이러한 한계를 극복하고자 나타난 방법론이 최종사용자들의 요구사항을 얼마나 적절하게 시스템에 반영했는지에 대한 사용성(Usability) 측정이다. 사용성에 대한 정의는 사용자들이 실질적으로 일하는 장소에서 직접 사용자들의 시스템 운용실태를 파악하여 문제점을 개선하는 것으로 요약할 수 있다. ISO9124-11에서는 사용성을 "어떤 제품이 구체적인 사용자들에 의해 구체적인 목적을 달성하기 위한 구체적인 사용의 맥락에서 효율성, 효과성을 만족함으로 사용될 수 있는 정도"로 정의하고 있다. 지난 10년간 병원정보시스템 평가에 대한 문헌들을 고찰한 결과 품질 측정의 효과는 정보화에 대한 동기유발과 의료품질을 높이는 게기가 되었으며, 질병에 대한 예방효과도 높은 것으로 조사되었다. 그러나 평가에 대한 인식의 문제, 평가 방법의 신뢰성 부족, 평가 지침과 부분적 평가에 따른 인증의 어려움 평가 결과에 대한 확산과 단편적 연구의 한계 등으로 연구결과에 대한 신뢰도와 활용도는 낮은 것으로 조사되었고, HIS에 대한 연구 빈도와 범위 가 매우 미약하였다. 특히, 품질속성은 같은 용어이지만 연구자에 따라 전혀 다른 측정 내용을 제시하고 있어 효율적인 품질 지표를 제시하는데 많은 혼란을 초래하고 있다. 이러한 품질 평가의 경향은 시스템 설계 및 개발자들에게 필요한 사용자들의 구체적이고 독특한 욕구나 병원정보시스템 환경의 특수성 파악에 한계를 보였으며, 평가 범위도 부분적으로 이루어져 전사적 시스템 설계 및 개발에 중요한 자료를 제공하지 못하고 있다. 이러한 문제점과 한계를 극복하고자 ISO와 같은 품질 표준 속성과 컨텍스트(Context)를 중심으로 사용자에 의한 평가 척도의 설정은 구체적이고 실용적이며 신뢰성 있는 평가 방법이 될 것이다.

  • PDF

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Design and Implementation of Medical Information System using QR Code (QR 코드를 이용한 의료정보 시스템 설계 및 구현)

  • Lee, Sung-Gwon;Jeong, Chang-Won;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.109-115
    • /
    • 2015
  • The new medical device technologies for bio-signal information and medical information which developed in various forms have been increasing. Information gathering techniques and the increasing of the bio-signal information device are being used as the main information of the medical service in everyday life. Hence, there is increasing in utilization of the various bio-signals, but it has a problem that does not account for security reasons. Furthermore, the medical image information and bio-signal of the patient in medical field is generated by the individual device, that make the situation cannot be managed and integrated. In order to solve that problem, in this paper we integrated the QR code signal associated with the medial image information including the finding of the doctor and the bio-signal information. bio-signal. System implementation environment for medical imaging devices and bio-signal acquisition was configured through bio-signal measurement, smart device and PC. For the ROI extraction of bio-signal and the receiving of image information that transfer from the medical equipment or bio-signal measurement, .NET Framework was used to operate the QR server module on Window Server 2008 operating system. The main function of the QR server module is to parse the DICOM file generated from the medical imaging device and extract the identified ROI information to store and manage in the database. Additionally, EMR, patient health information such as OCS, extracted ROI information needed for basic information and emergency situation is managed by QR code. QR code and ROI management and the bio-signal information file also store and manage depending on the size of receiving the bio-singnal information case with a PID (patient identification) to be used by the bio-signal device. If the receiving of information is not less than the maximum size to be converted into a QR code, the QR code and the URL information can access the bio-signal information through the server. Likewise, .Net Framework is installed to provide the information in the form of the QR code, so the client can check and find the relevant information through PC and android-based smart device. Finally, the existing medical imaging information, bio-signal information and the health information of the patient are integrated over the result of executing the application service in order to provide a medical information service which is suitable in medical field.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

Application of LCA on Lettuce Cropping System by Bottom-up Methodology in Protected Cultivation (시설상추 농가를 대상으로 하는 bottom-up 방식 LCA 방법론의 농업적 적용)

  • Ryu, Jong-Hee;Kim, Kye-Hoon;Kim, Gun-Yeob;So, Kyu-Ho;Kang, Kee-Kyung
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.44 no.6
    • /
    • pp.1195-1206
    • /
    • 2011
  • This study was conducted to apply LCA (Life cycle assessment) methodology to lettuce (Lactuca sativa L.) production systems in Namyang-ju as a case study. Five lettuce growing farms with three different farming systems (two farms with organic farming system, one farm with a system without agricultural chemicals and two farms with conventional farming system) were selected at Namyangju city of Gyeonggi-province in Korea. The input data for LCA were collected by interviewing with the farmers. The system boundary was set at a cropping season without heating and cooling system for reducing uncertainties in data collection and calculation. Sensitivity analysis was carried out to find out the effect of type and amount of fertilizer and energy use on GHG (Greenhouse Gas) emission. The results of establishing GTG (Gate-to-Gate) inventory revealed that the quantity of fertilizer and energy input had the largest value in producing 1 kg lettuce, the amount of pesticide input the smallest. The amount of electricity input was the largest in all farms except farm 1 which purchased seedlings from outside. The quantity of direct field emission of $CO_2$, $CH_4$ and $N_2O$ from farm 1 to farm 5 were 6.79E-03 (farm 1), 8.10E-03 (farm 2), 1.82E-02 (farm 3), 7.51E-02 (farm 4) and 1.61E-02 (farm 5) kg $kg^{-1}$ lettuce, respectively. According to the result of LCI analysis focused on GHG, it was observed that $CO_2$ emission was 2.92E-01 (farm 1), 3.76E-01 (farm 2), 4.11E-01 (farm 3), 9.40E-01 (farm 4) and $5.37E-01kg\;CO_2\;kg^{-1}\;lettuce$ (farm 5), respectively. Carbon dioxide contribute to the most GHG emission. Carbon dioxide was mainly emitted in the process of energy production, which occupied 67~91% of $CO_2$ emission from every production process from 5 farms. Due to higher proportion of $CO_2$ emission from production of compound fertilizer in conventional crop system, conventional crop system had lower proportion of $CO_2$ emission from energy production than organic crop system did. With increasing inorganic fertilizer input, the process of lettuce cultivation covered higher proportion in $N_2O$ emission. Therefore, farms 1 and 2 covered 87% of total $N_2O$ emission; and farm 3 covered 64%. The carbon footprints from farm 1 to farm 5 were 3.40E-01 (farm 1), 4.31E-01 (farm 2), 5.32E-01 (farm 3), 1.08E+00 (farm 4) and 6.14E-01 (farm 5) kg $CO_2$-eq. $kg^{-1}$ lettuce, respectively. Results of sensitivity analysis revealed the soybean meal was the most sensitive among 4 types of fertilizer. The value of compound fertilizer was the least sensitive among every fertilizer imput. Electricity showed the largest sensitivity on $CO_2$ emission. However, the value of $N_2O$ variation was almost zero.