• Title/Summary/Keyword: 인지적 취약성

Search Result 126, Processing Time 0.03 seconds

Technology Risk and Social Responsibility of Innovation: The Shut-Down Law and On-line Game as a Post Catch-up Innovation (기술위험과 혁신의 사회적 책임 - 셧다운제와 탈추격형 혁신으로서 온라인게임 -)

  • Jung, Byung Kul
    • Informatization Policy
    • /
    • v.20 no.4
    • /
    • pp.71-88
    • /
    • 2013
  • Probability of technology risk is expected to increase as the post catch-up innovation, characterized by high uncertainty and high risk, would dominate in the coming era of post catchup. Social controversy on online game as a post catch-up innovation is still ongoing, though the shutdown law was enacted by the government. Socio-technical vulnerability causing technology risk paradoxically arose from the world top-level ICT infrastructures and has been reinforced by developmentalism. While both the pros and cons of the regulation fail to recognize dilemma objectively, social cost is brought about and accumulated. With recognizing dilemma between technology innovation and risks, we can tackle technology risks and ensure responsible innovation in post catch-up era.

  • PDF

Effect of Administration of Iron on the Lipid Concentrations in the RBC Membrane and Plasma (철분 투여가 적혈구막 및 혈장내의 지질함량에 미치는 영향)

  • Kim, Sung-hoon;Huh, Rhin-sou;Park, Hang-kyun;Do, Jae-chul;Lee, Young-ho
    • Korean Journal of Veterinary Research
    • /
    • v.25 no.2
    • /
    • pp.125-131
    • /
    • 1985
  • 철분투여가 용혈성 빈혈에 미치는 영향을 알아보기 위하여 흰쥐의 사료내에 철분을 혼합급여 또는 근육내에 주사하면서 60일간 사육하고 체중은 10일 간격으로 측정하였으며 적혈구의 취약성 실험과 적혈구막 및 혈장내의 vitamin E 함량과 인지질의 함량을 비색방법으로 측정한 결과 다음과 같은 성적을 얻었다. 증체량 측정에서는 A군의 190g에 비하여 C군 155g, B군 142g, D군 112g으로 철분함량이 높은 군에서 낮은 증가를 보였으며 적혈구 취약성 실험 결과 5마리 암수 평균값이 각각 A군 7.63% 및 2.68%, C군 10.84% 및 16.75%, B군 25.54% 및 33.62%, D군 47.23% 및 38.35%로 철분함량에 비례하여 각 실험군 사이에 유의한 증가를 나타내었다. 또한 적혈구막의 vitamin E 및 인지질의 함량은 5마리 암수 평균값이 각각 A군에서 18.54mg/dl 및 17.43mg/dl 그리고 120.55mg/dl 및 113.94mg/dl, C군에서 14.99mg/dl 및 10.56mg/dl 그리고 108.54mg/dl 및 99.97mg/dl, B군에서 13.10mg/dl 및 11.02mg/dl 그리고 91.67mg/dl 및 87.45mg/dl, D군에서 6.86mg/dl 및 8.87mg/dl 그리고 79.78mg/dl 및 70.12mg/dl로서 철분 투여량에 비례적으로 감소하였다. 혈장내의 vitamin E 및 인지질의 함량은 A군, C군, B군, D군의 순으로 각각 함량이 2.51mg/dl 및 31mg/dl, 1.94mg/dl 및 21mg/dl, 1.37mg/dl 및 20mg/dl 그리고 1.37mg/dl 및 15mg/dl로 철분 투여량에 비례적으로 감소하는 경향을 나타내었다.

  • PDF

Privacy Aware Authentication Protocol for Cognitive Radio Networks (인지무선 네트워크를 위한 프라이버시가 강화된 인증 프로토콜)

  • Kim, Hyun-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.33-40
    • /
    • 2010
  • Recently, the spectrum scarcity is becoming a big issue because there are exponential growth of broadcasting and communication systems in the spectrum demand. Cognitive radio is a technology that is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. Kuroda et al. proposed a radio-independent authentication protocol for cognitive radio networks. This paper first shows the privacy weaknesses in the authentication protocol by Kuroda et al. and proposes a privacy aware authentication protocol to solve the weaknesses.

Discussion on Formulation Process and Configuration of Fire-Fighting Vulnerable Zone Model (소방취약지 모델의 구성과 정립프로세스 논의)

  • Kim, Seong Gon;Chang, Eun Mi;Choi, Gap Yong;Kim, Hi Tae
    • Spatial Information Research
    • /
    • v.22 no.3
    • /
    • pp.71-77
    • /
    • 2014
  • There are numbers of unpredictable risk factors in the disaster scenes such as fire, explosion and fail to early life-saving or holding the flames which can lead to massive damage. In particular, fire-fighters who arrive on the scene within 5 minutes after dispatching, have a limitation to get aware to the situation of scene fully, because of immediate deploy to disaster scene with limited information. This situation may lead to disturbance that fire-fighters perform effective fire-fighting activities, to put fire-fighter's life at risk by misjudge the situation. Previous domestic and International studies focused vulnerability for spatial area or features which can damage to life and property in the event of anticipated. In this study, we have been developed fire-fighting vulnerable zone model that can analyze comprehensively hindrance factors for fire-fighting activities targeting whole life cycle of fire-fighting activities from dispatch to fire suppression or life-saving. In addition, we have been given shape to finality and applicability for our model by defining the new concept of fire-fighting vulnerable zone which can be distinguished from the concept of fire vulnerable area in previous studies. The results of this study can be used to analysis fire-fighting vulnerable zone type analysis, establish fire-fighting policies and improve the performance of decision-making process.

A Study on the Optimization Methods of Security Risk Analysis and Management (경비위험 분석 및 관리의 최적화 방안에 관한 연구)

  • Lee, Doo-Suck
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.189-213
    • /
    • 2005
  • Risk management should be controlled systematically by effectively evaluating and suggesting countermeasures against the various risks which are followed by the change of the society and environment. These days, enterprise risk management became a new trend in the field. The first step in risk analysis is to recognize the risk factors, that is to verify the vulnerabilities of loss in the security facilities. The second step is to consider the probability of loss in assessing the risk factors. And the third step is to evaluate the criticality of loss. The security manager will determine the assessment grades and then the risk levels of each risk factor, on the basis of the result of risk analysis which includes the assessment of vulnerability, the provability of loss and the criticality. It is of great importance to put the result of risk analysis in mathematical statement for a scientific approach to risk management. Using the risk levels gained from the risk analysis, the security manager can develop a comprehensive and supplementary security plan. In planning the risk management measures to prepare against and minimize the loss, insurance is one of the best loss-prevention programs. However, insurance in and of itself is no longer able to meet the security challenges faced by major corporations. The security manager have to consider the cost-effectiveness, to suggest the productive risk management alternatives by using the security files which contains every information about the security matters. Also he/she have to reinforce the company regulations on security and safety, and to execute education repeatedly on security and risk management. Risk management makes the most efficient before-the-loss arrangement for and after-the-loss continuation of a business. So it is very much important to suggest a best cost-effective and realistic alternatives for optimizing risk management above all, and this function should by maintained and developed continuously and repeatedly.

  • PDF

A preliminary study on factors affecting cognitive function and cognitive training effects (인지기능 및 인지훈련효과의 관련변인에 관한 예비연구)

  • Kim, Youngkyoung
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.343-351
    • /
    • 2020
  • The present study investigated the related variables of cognitive function, subjective cognitive decline and cognitive training effects. The cognitive training was composed of mete-cognitive education and cognitive task performing. Twenty older adults attended for 14 weeks and were tested before and after the training. Results show that their cognitive level was related with age, self-esteem and personality traits. And subjective cognitive decline was related depression, anxiety, personality traits, self-efficacy, self-esteem and subjective age, but it does not reflect objective cognitive impairments. Their cognitive test scores were enhanced after training in MMSE, memory and executive function, and enhanced scores were related with age, subjective cognitive decline, anxiety, self-efficacy, self-esteem, subjective age and personality traits. Findings suggest one's personality and psychological state need to be considered for the effects of cognitive training.

A Study on the Pilot Application of Disaster Information Delivery and Evacuation Support System for the Vulnerable Groups (안전취약계층 대상 재난정보 전달 및 대피지원 체계 시범적용 연구)

  • Jung Tae-Ho;Lee, Han-Jun
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2022.10a
    • /
    • pp.139-140
    • /
    • 2022
  • 본 연구는 재난발생 시 현장 상황 판단 및 대응 능력이 현저히 떨어지는 안전취약계층 중 장애인과 노인이 재난정보를 받고 안전하게 대피·대응할 수 있도록 지원하는 시스템의 시범적용에 대한 것이다. 재난정보 전달 및 대피지원 시스템은 재난에 취약한 장애인과 노인이 재난상황에서 각각의 취약 특성을 고려하여 재난 위기상황에 대응하도록 설계 하였으며, 실내 위치측정에 관한 공간정보 표준 및 데이터 구축과 개발한 시스템을 설치하고 구현할 수 있는 실내 공간을 선정하여 시범적으로 적용하였다. 재난정보 및 대피지원 시스템의 시범적용을 위해 선정된 시설의 실내 공간정보 구축 및 현행화를 통해 실내 대피경로를 구축하고, 실제 시범적용을 통해 보완하는 과정을 수행하였다. 장애인·노인 대상 재난정보 전달 및 대피지원 서비스 구축을 위해 실내에서 재난발생 시 재난정보 데이터를 실시간으로 수집하고 스마트폰과 연계할 수 있는 연계 모듈을 개발하였다. 또한 재난정보를 스마트폰에 알릴 수 있는 알람 푸시 모듈, 재난정보 및 대피 안내 모듈과 시각 장애인의 실내 공간 인지를 위한 음성안내 모듈을 개발하였다. 본 연구의 목적은 IoT 기반의 통합관제 기술을 활용하는 서비스 제공을 통해서 정보전달의 사각지대를 해소하고 장애인·노인의 효율적 재난 대응을 위해 맞춤형 재난정보 전달 및 대피지원 서비스를 구축하고 시범적용의 과정을 통해 문제점을 보완하여 최종적으로 재난으로부터 안전취약계층의 안전성을 향상시키는데 목적이 있다.

  • PDF

Analysis of Non-monotonic Phenomena of Resilience and Vulnerability in Water Resources Systems (수자원시스템의 회복도 및 취약도 증감현상 해석)

  • Lee, Gwang-Man;Cha, Kee-Uk;Yi, Jaeeung
    • Journal of Korea Water Resources Association
    • /
    • v.46 no.2
    • /
    • pp.183-193
    • /
    • 2013
  • Selecting the evaluation index to determine water resources system design yield is an important problem for water resources engineers. Reliability, resilience and vulnerability are three widely used indices for yield analysis. However, there is an overlap region between indices as well as resilience and vulnerability can show improvement in non-monotonic phenomena although yield condition becomes worse. These problems are usually not recognized and the decisions are made according to calculated estimates in real situation. The reason for this is caused by a diverse characteristics of water resources system such as seasonal variability of hydrologic characteristics and water demands. In this study, the applicability of resilience and vulnerability for multi indices application in addition to reliability which is applied generally is examined. Based on highly seasonal irrigation water demand ratio, the correlation and non-monotonic phenomena of each index are analyzed for seven selected reservoirs. Yongdam reservoir which supplies constant water supply showed the general tendency, but Chungju, Andong, Namgang and other reservoirs which supplies irrigation water showed clear non-monotonic phenomena in resilience and vulnerability.

A Study on the Strategic Media Literacy Corresponding to Ontact Period (온택트 시대의 대응을 위한 미디어 리터러시의 전략적 고찰)

  • Lee, Sanggil
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2020.11a
    • /
    • pp.256-259
    • /
    • 2020
  • 미디어 환경이 급격이 변화되고, 최근 코로나 19로 인해 온택트 시대가 가속화되면서 미디어 리터러시는 모든 사람들에게 일반적 상황이 되고 있다. 미디어 리터러시는 다양한 분야에서 그 중요성이 인지되고 있으나 아직은 조직적 대응이 부족한 것이 현실이다. 왜냐하면 미디어의 활용 능력의 한계, 윤리적 문제의 돌출, 미디어의 비판적 인식의 취약성 등으로 인해 사회적 문제로 확대되고 있기 때문이다. 따라서 여러 분야에서 미디어 리터러시 교육의 필요성이 절실하게 부각되고 있어 현재 국가적 차원에서도 미디어 소비자의 권익을 보호하고 윤리적 문제 인식을 강화시키기 위해 교육센터의 설치 및 운영, 국회 차원에서 관련 법안 발의 등 다양한 시도가 이루어지고 있다. 본 논문에서는 미디어 리터러시의 의미와 그 교육의 현황을 국내외적으로 알아보고 미디어 리터러시를 전략적으로 고찰하고자 한다.

  • PDF

System Design and Implementation for Security Policy Management of Windows Based PC and Weakness Inspection (Windows 기반의 PC 보안 정책 관리 및 취약성 점검을 위한 시스템 설계 및 구현)

  • Park, Byung-Yeon;Yang, Jong-Won;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.23-30
    • /
    • 2008
  • Attempt to protect personal computer from hacking, virus, worm, and the troy wooden horse is progressed variously. Nevertheless, it is very difficult fer public users to understand configurations to enhance security stability in windows based personal computer, and many security problem is due to there lack of recognize about information accessability, various kind of configuration, these necessity, and efficiency. Accordingly, it is demandded to develop an efficient system to protect networks and personal computer with automated method. In this paper, we derive problems of personal computer by analyzing various vulnerableness and policy on security, through which we design and implement the system to solve various windows system problem conveniently.